SlideShare a Scribd company logo
1 of 10
Download to read offline
Analytics-BasedCrime Prediction
Moving From Reactive to Proactive Policing
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
A US city uses predictive analytics to reduce burglaries by 30%
In one of the
US tier II
cities, 200
burglary cases
were reported
in 2 years
Further analysis
shows that the
targets have been
departmental
stores, gas
stations, retail
chains, mini
marts, etc.
Through hot
spot analysis it
is found that
entire east side
of the city is a
burglary hot
spot.
Further
analysis
showed that
specifically 21
stores were
targeted more
than 130
times.
After using predictive
analytical tools , the
date & time of next
burglary for 17 stores
for next 15 days was
predicted. It was also
found that 13 stores
out of 21 belonged to
one specific retail
chain.This helped in
effective deployment
of resources ahead of
crime, resulting in
moving from ‘what
happened’ to ‘what
will happen’ and
changing the
outcomes.
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
What makes crime predictable?
As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of
earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable.
Same is true for the crimes happening in a geographical area.
On behavioral grounds, it has been found that once successful, criminals try to replicate the crime under similar conditions.
They tend to operate in their comfort zone, and hence, they look for similar location and time for the next crime.
This makes them predictable.
In the words of Charlie Beck,Chief of the
LosAngeles Police Department, “The
predictive vision moves law enforcement
from focusing on what happened to
focusing on what will happen and how to
effectively deploy resources in front of
crime, thereby changing outcomes.”
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Predicting crime by applying analytics on data feeds from various sources
Predictive policing, in essence, is taking data from disparate sources, analyzing them and then using results to anticipate, prevent and respond
more effectively to future crime.
Crime prediction completely relies on huge amounts of data – historical data, data coming from CCTVs, social media conversations, weather
reports, population data, public events data, economic growth related data, etc. This data is then analyzed through complex mathematical
models, predictive analytics technique and machine learning algorithms to identify patterns of crime which can’t be seen by humans.
The collected data is pre-processed and analyzed to identify the hidden patterns and correlation between crime type and locations are derived.
Predictive Models are built using machine learning algorithms to predict the future crime occurrences
Crime Big
Data
Predictive
Intelligenc
e
Crime
Predictio
n
- Historical data, Public transit maps etc.,
- Connected devices, body cameras, facial
recognition, sensor networks, etc.
- Social media, CCTV
- Mathematical models
- Machine learning algorithms
- Predictive policing
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Conversion of data to prediction and its impact
Data Fusion - A lot of external environmental factors influence the act of crime and these may or may not be collected by
police depts. These data sets are usually on businesses, infrastructure and demographics. Taking into consideration these
disparate data sets during analysis can give more precise predictions
Data should be collected from various sources.
The accuracy of predictions depends on
completeness and accuracy of this data. The
various sources can be historical police
records, public maps, CCTV, social media,
body worn cameras, etc.
Analytical techniques like hot spot
analysis, data mining, regression,
spatiotemporal methods, risk-terrain
analysis are used for predicting various
categories of crime
As a result of better police interventions
criminals can be arrested, crimes stopped, and
their location or techniques changed. Under
any circumstance, the original data set is
rendered obsolete and fresh one is needed,
thus starting the cycle from step one.
Correct intervention technique needs to be
planned to act on the predictions. These
techniques can be generic, crime-specific
or problem-specific
Analysis
Police OperationsCriminal Response
Data Collection
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Analytical techniques to predict “where, when and what” of crime
It is crucial to identify where the crime will happen, what will happen and when.
The below matrix would help you in choosing the right analytical technique
for the required function.
Machine Learning vs. Rule-Based Engines
- Machine Learning builds intelligence from various sources of data and its output. ML algorithms tries to mimic human intelligence with minimal intervention. This intelligence
gets upgraded over time as new or additional datais made available. The ML Algorithm automatically adjusts the parameters to check for pattern change with new data.
- With rule based engine solutions, rules have to be updated frequently which increases manual intervention. Also, with increasing data, rule engine becomes heavy and
maintenance becomes difficult.
Technique Where What When
Random Forrest
Gradient Boosting Machine
Hot Spot Analysis
Time Series
Near-Repeat Methods
Statistical Regression
Risk-Terrain Analysis
Spatiotemporal
SVM(Support Vector Machine) performs better for
Binary classification problems rather than multiclass
classification.
Random Forest Classification and Gradient Boosting
Machine gives better results for Multi-Class Multi-Label
classification problems.
For huge datasets with data that can be grouped by a
specific category (e.g., areas in a state) and more output
labels to be predicted (e.g., list of hotspots in the entire
state), it is recommended to use split and combine
approach (build smaller models and combine the
predicted results) for higher efficiency.
KEY
CONSIDERATIONS
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Using multi-label classification techniques and time series analysis to predict location,
category and time of crime
In one of the US
tier I cities, the
number of crimes
reported over past 5
years is close to 1.5
million.
This data is pre-processed and initial
patterns are identified pertaining to
every district. The city is divided in to 23 districts and
every district is sub-divided into various wards.
Initial findings such as most crime prone ward, most
popular crime in any ward etc. are found out at this
stage.
Hot spot analysis
helped in creating crime
heat map which showed
that the central and
eastern parts are
more crime-prone.
Time series analysis of the same 5
years of data gave probable time
of occurrence of crimes identified
in previous step.
With the prediction accuracy of 60-74% and
appropriate intervention techniques,
approximate reduction of 30% in burglaries
and 20-25% in property related crimes can
be achieved.
Identifying the
“when” of crime
Identifying the
“what” and “where”
of crime
30%
25%
Burglaries
Property-related
crimes
Multi-label techniques like
“Gradient boosting,” “Random
forest,” etc. identified which crime can
happen in each of the subsequent
wards of the
23 districts
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Key takeaways
Accuracy of 60-74% can be achieved in predicting category of crime by multi-label classification techniques like “gradient
boosting machine” and “random forest.”
In Richmond, crime prediction decreased random gunfire by 47% and saved $15000 in personal costs on New
Year’s Eve. Weapons seize also increased by 246%.
Los Angeles saw 33%reduction in burglaries, 21% reduction in violent crimes and 12% reduction in
property crimes as a result of predictive policing.
As a result of crime prediction,Alhambra reported 32% drop in burglaries and 20%drop in vehicle theft over a
period of 15 months.
Crime prediction accuracy of 65-72% can be achieved by analyzing just 4-5 years of crime data.
Including feeds coming from social media, accuracy of prediction can be increased by up to 15%.
Confidential & Restricted
Copyright © 2017 Prodapt Solutions. All Rights Reserved.
Credits
• Avaiarasi S, Director - Delivery (IoT)
• Kamakya C, Project Manager - IoT
• Sarvagya Nayak, Business Analyst - Insights
9
Chennai
Johannesburg
New York
Dallas
Tualatin
Amsterdam
London
THANKYOU!
Prodapt Solutions Pvt. Ltd.
INDIA
Chennai:
1. Prince Infocity II, OMR
Ph: +91 44 4903 3000
2. “Chennai One” SEZ, Thoraipakkam
Ph: +91 44 4230 2300
SOUTH AFRICAUSA
Prodapt North America
Tualatin: 7565 SW Mohawk St.,
Ph: +1 503 636 3737
Dallas: 222 W. Las Colinas Blvd., Irving
Ph: +1 972 201 9009
New York: 1 Bridge Street, Irvington
Ph: +1 646 403 8158
Prodapt SA (Pty) Ltd.
Johannesburg: No. 3,
3rd Avenue, Rivonia
Ph: +27 (0) 11 259 4000
THE NETHERLANDS
Prodapt Solutions Europe
Amsterdam: Zekeringstraat 17A, 1014 BM
Ph: +31 (0) 20 4895711
Prodapt Consulting BV
Rijswijk: De Bruyn Kopsstraat14
Ph: +31 (0) 70 4140722
UK
Prodapt (UK) Limited
Reading: Davidson House,
The Forbury,
Reading RG1 3EU
Ph: +44 (0) 11 8900 1068
Bengaluru
Bangalore: “CareerNet Campus”
No. 53, Devarabisana Halli,
Outer Ring Road

More Related Content

What's hot

Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Osokop
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveBenjamin Ang
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceKaushik Rajan
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learningdataalcott
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 

What's hot (20)

Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduce
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 

Similar to Analytics-Based Crime Prediction

Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting SystemIRJET Journal
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxaudeleypearl
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxroushhsiu
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?IBM Analytics
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionAPNIC
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET Journal
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...AIRCC Publishing Corporation
 
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
GIS based Decision Support System for Crime Mapping, Analysis  and identify H...GIS based Decision Support System for Crime Mapping, Analysis  and identify H...
GIS based Decision Support System for Crime Mapping, Analysis and identify H...IJMER
 

Similar to Analytics-Based Crime Prediction (20)

Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
 
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
GIS based Decision Support System for Crime Mapping, Analysis  and identify H...GIS based Decision Support System for Crime Mapping, Analysis  and identify H...
GIS based Decision Support System for Crime Mapping, Analysis and identify H...
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 

More from Prodapt Solutions

One touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-preventionOne touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-preventionProdapt Solutions
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsProdapt Solutions
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMProdapt Solutions
 
FTTP-IPTV-Rollout-–-What-Operators-Need-to-Qualify
FTTP-IPTV-Rollout-–-What-Operators-Need-to-QualifyFTTP-IPTV-Rollout-–-What-Operators-Need-to-Qualify
FTTP-IPTV-Rollout-–-What-Operators-Need-to-QualifyProdapt Solutions
 
Constraints & Bottlenecks in Service Provisioning
Constraints & Bottlenecks in Service ProvisioningConstraints & Bottlenecks in Service Provisioning
Constraints & Bottlenecks in Service ProvisioningProdapt Solutions
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platformProdapt Solutions
 
Prodapt Corporate Overview Presentation
Prodapt Corporate Overview PresentationProdapt Corporate Overview Presentation
Prodapt Corporate Overview PresentationProdapt Solutions
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation ServicesProdapt Solutions
 
MetaSolv Implementation Services
MetaSolv Implementation ServicesMetaSolv Implementation Services
MetaSolv Implementation ServicesProdapt Solutions
 

More from Prodapt Solutions (14)

One touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-preventionOne touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-prevention
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice Solutions
 
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSMAn Adaptive Priority Approach for Effective Problem Resolution in ITSM
An Adaptive Priority Approach for Effective Problem Resolution in ITSM
 
Nic solution strategy
Nic solution strategyNic solution strategy
Nic solution strategy
 
FTTP-IPTV-Rollout-–-What-Operators-Need-to-Qualify
FTTP-IPTV-Rollout-–-What-Operators-Need-to-QualifyFTTP-IPTV-Rollout-–-What-Operators-Need-to-Qualify
FTTP-IPTV-Rollout-–-What-Operators-Need-to-Qualify
 
RPA in Number Portability
RPA in Number PortabilityRPA in Number Portability
RPA in Number Portability
 
Constraints & Bottlenecks in Service Provisioning
Constraints & Bottlenecks in Service ProvisioningConstraints & Bottlenecks in Service Provisioning
Constraints & Bottlenecks in Service Provisioning
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
 
Prodapt Corporate Overview Presentation
Prodapt Corporate Overview PresentationProdapt Corporate Overview Presentation
Prodapt Corporate Overview Presentation
 
Metasolv Post Implementation Services
Metasolv Post Implementation ServicesMetasolv Post Implementation Services
Metasolv Post Implementation Services
 
MetaSolv Implementation Services
MetaSolv Implementation ServicesMetaSolv Implementation Services
MetaSolv Implementation Services
 
DPI R&D Service
DPI R&D ServiceDPI R&D Service
DPI R&D Service
 
Migration Services
Migration ServicesMigration Services
Migration Services
 
Prodapt Overview & Offering
Prodapt Overview & OfferingProdapt Overview & Offering
Prodapt Overview & Offering
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Analytics-Based Crime Prediction

  • 1. Analytics-BasedCrime Prediction Moving From Reactive to Proactive Policing
  • 2. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. A US city uses predictive analytics to reduce burglaries by 30% In one of the US tier II cities, 200 burglary cases were reported in 2 years Further analysis shows that the targets have been departmental stores, gas stations, retail chains, mini marts, etc. Through hot spot analysis it is found that entire east side of the city is a burglary hot spot. Further analysis showed that specifically 21 stores were targeted more than 130 times. After using predictive analytical tools , the date & time of next burglary for 17 stores for next 15 days was predicted. It was also found that 13 stores out of 21 belonged to one specific retail chain.This helped in effective deployment of resources ahead of crime, resulting in moving from ‘what happened’ to ‘what will happen’ and changing the outcomes.
  • 3. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. What makes crime predictable? As per studies conducted by the University of California, it is observed that crime in any area follows the same pattern as that of earthquake aftershocks. It is difficult to predict an earthquake, but once it happens the aftershocks following it are quite predictable. Same is true for the crimes happening in a geographical area. On behavioral grounds, it has been found that once successful, criminals try to replicate the crime under similar conditions. They tend to operate in their comfort zone, and hence, they look for similar location and time for the next crime. This makes them predictable. In the words of Charlie Beck,Chief of the LosAngeles Police Department, “The predictive vision moves law enforcement from focusing on what happened to focusing on what will happen and how to effectively deploy resources in front of crime, thereby changing outcomes.”
  • 4. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Predicting crime by applying analytics on data feeds from various sources Predictive policing, in essence, is taking data from disparate sources, analyzing them and then using results to anticipate, prevent and respond more effectively to future crime. Crime prediction completely relies on huge amounts of data – historical data, data coming from CCTVs, social media conversations, weather reports, population data, public events data, economic growth related data, etc. This data is then analyzed through complex mathematical models, predictive analytics technique and machine learning algorithms to identify patterns of crime which can’t be seen by humans. The collected data is pre-processed and analyzed to identify the hidden patterns and correlation between crime type and locations are derived. Predictive Models are built using machine learning algorithms to predict the future crime occurrences Crime Big Data Predictive Intelligenc e Crime Predictio n - Historical data, Public transit maps etc., - Connected devices, body cameras, facial recognition, sensor networks, etc. - Social media, CCTV - Mathematical models - Machine learning algorithms - Predictive policing
  • 5. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Conversion of data to prediction and its impact Data Fusion - A lot of external environmental factors influence the act of crime and these may or may not be collected by police depts. These data sets are usually on businesses, infrastructure and demographics. Taking into consideration these disparate data sets during analysis can give more precise predictions Data should be collected from various sources. The accuracy of predictions depends on completeness and accuracy of this data. The various sources can be historical police records, public maps, CCTV, social media, body worn cameras, etc. Analytical techniques like hot spot analysis, data mining, regression, spatiotemporal methods, risk-terrain analysis are used for predicting various categories of crime As a result of better police interventions criminals can be arrested, crimes stopped, and their location or techniques changed. Under any circumstance, the original data set is rendered obsolete and fresh one is needed, thus starting the cycle from step one. Correct intervention technique needs to be planned to act on the predictions. These techniques can be generic, crime-specific or problem-specific Analysis Police OperationsCriminal Response Data Collection
  • 6. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Analytical techniques to predict “where, when and what” of crime It is crucial to identify where the crime will happen, what will happen and when. The below matrix would help you in choosing the right analytical technique for the required function. Machine Learning vs. Rule-Based Engines - Machine Learning builds intelligence from various sources of data and its output. ML algorithms tries to mimic human intelligence with minimal intervention. This intelligence gets upgraded over time as new or additional datais made available. The ML Algorithm automatically adjusts the parameters to check for pattern change with new data. - With rule based engine solutions, rules have to be updated frequently which increases manual intervention. Also, with increasing data, rule engine becomes heavy and maintenance becomes difficult. Technique Where What When Random Forrest Gradient Boosting Machine Hot Spot Analysis Time Series Near-Repeat Methods Statistical Regression Risk-Terrain Analysis Spatiotemporal SVM(Support Vector Machine) performs better for Binary classification problems rather than multiclass classification. Random Forest Classification and Gradient Boosting Machine gives better results for Multi-Class Multi-Label classification problems. For huge datasets with data that can be grouped by a specific category (e.g., areas in a state) and more output labels to be predicted (e.g., list of hotspots in the entire state), it is recommended to use split and combine approach (build smaller models and combine the predicted results) for higher efficiency. KEY CONSIDERATIONS
  • 7. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Using multi-label classification techniques and time series analysis to predict location, category and time of crime In one of the US tier I cities, the number of crimes reported over past 5 years is close to 1.5 million. This data is pre-processed and initial patterns are identified pertaining to every district. The city is divided in to 23 districts and every district is sub-divided into various wards. Initial findings such as most crime prone ward, most popular crime in any ward etc. are found out at this stage. Hot spot analysis helped in creating crime heat map which showed that the central and eastern parts are more crime-prone. Time series analysis of the same 5 years of data gave probable time of occurrence of crimes identified in previous step. With the prediction accuracy of 60-74% and appropriate intervention techniques, approximate reduction of 30% in burglaries and 20-25% in property related crimes can be achieved. Identifying the “when” of crime Identifying the “what” and “where” of crime 30% 25% Burglaries Property-related crimes Multi-label techniques like “Gradient boosting,” “Random forest,” etc. identified which crime can happen in each of the subsequent wards of the 23 districts
  • 8. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Key takeaways Accuracy of 60-74% can be achieved in predicting category of crime by multi-label classification techniques like “gradient boosting machine” and “random forest.” In Richmond, crime prediction decreased random gunfire by 47% and saved $15000 in personal costs on New Year’s Eve. Weapons seize also increased by 246%. Los Angeles saw 33%reduction in burglaries, 21% reduction in violent crimes and 12% reduction in property crimes as a result of predictive policing. As a result of crime prediction,Alhambra reported 32% drop in burglaries and 20%drop in vehicle theft over a period of 15 months. Crime prediction accuracy of 65-72% can be achieved by analyzing just 4-5 years of crime data. Including feeds coming from social media, accuracy of prediction can be increased by up to 15%.
  • 9. Confidential & Restricted Copyright © 2017 Prodapt Solutions. All Rights Reserved. Credits • Avaiarasi S, Director - Delivery (IoT) • Kamakya C, Project Manager - IoT • Sarvagya Nayak, Business Analyst - Insights 9
  • 10. Chennai Johannesburg New York Dallas Tualatin Amsterdam London THANKYOU! Prodapt Solutions Pvt. Ltd. INDIA Chennai: 1. Prince Infocity II, OMR Ph: +91 44 4903 3000 2. “Chennai One” SEZ, Thoraipakkam Ph: +91 44 4230 2300 SOUTH AFRICAUSA Prodapt North America Tualatin: 7565 SW Mohawk St., Ph: +1 503 636 3737 Dallas: 222 W. Las Colinas Blvd., Irving Ph: +1 972 201 9009 New York: 1 Bridge Street, Irvington Ph: +1 646 403 8158 Prodapt SA (Pty) Ltd. Johannesburg: No. 3, 3rd Avenue, Rivonia Ph: +27 (0) 11 259 4000 THE NETHERLANDS Prodapt Solutions Europe Amsterdam: Zekeringstraat 17A, 1014 BM Ph: +31 (0) 20 4895711 Prodapt Consulting BV Rijswijk: De Bruyn Kopsstraat14 Ph: +31 (0) 70 4140722 UK Prodapt (UK) Limited Reading: Davidson House, The Forbury, Reading RG1 3EU Ph: +44 (0) 11 8900 1068 Bengaluru Bangalore: “CareerNet Campus” No. 53, Devarabisana Halli, Outer Ring Road