SlideShare a Scribd company logo
1 of 2
Download to read offline
Crime Data Analyis Using Data Mining for Crime
Prediction
Anavadya Shibu; Anish S. A.; Gokul Krishnan S.;Vijayalekshmi V. R.
S8 Computer Science and Engineering
Mohandas College of Engineering and Technology
Anad, Nedumangad, Thiruvananthapuram -695544
Mrs. Prathibha S. Nair,
Assistant Professor, Department of Computer Science and Engineering,
Mohandas College of Engineering and Technology
Anad, Nedumangad, Thiruvananthapuram -695544
Abstract— This project presents a general idea about the
model of Data Mining techniques and diverse crimes. It also
provides an inclusive survey of competent and valuable
techniques on data mining for crime data analysis. The
objective of the data mining is to recognize patterns in
criminal manners in order to predict crime anticipate
criminal activity and prevent it. This project implements a
novel data mining techniques like KNN, Text Clustering, IR
tree for investigating the crime data sets and sorts out the
accessible problems. The collective knowledge of various
data mining algorithms tend certainly to afford an
enhanced, incorporated, and precise result over the crime
prediction in the banking sectors Our law enforcement
organizations require to be adequately outfitted to defeat
and prevent the crime. This project is developed using Java
as front-end and MySQL as back-end. Supporting
applications like Sunset, NetBeans are used to make the
portal more interactive.
Keywords-component; formatting; style; styling; insert
(key words)
I. INTRODUCTION
Data Mining or Knowledge Discovery in Databases (KDD
in simple words is nontrivial extraction of implicit,
previously unknown, and potentially useful information
from data [1],[2],[3]. It deals with the discovery of hidden
knowledge, unexpected patterns and new rules from large
databases. KDD is the process of indentifying a valid,
potentially, useful and ultimately understandable structure
in data. Data mining represents of the emerging field that
can be used a wide disciplinary of applications including
marketing, banking, airlines and many other fields that
highly affect the communities. Crime analyzes is one of
these important applications of data mining. Data mining
contains many tasks and techniques including
Classification, Association, Clustering, Prediction each of
them has its own importance and applications [1],[2],[ 3].
Advances in technology, which allow analyzes of large
quantities of data, are the foundation for the for relatively
new field known as crime analyze. Crime analyzes is an
emerging field in law enforcement without standard
definitions. This makes it difficult to determine the crime
analyzes focus for agencies that are new to the field. In
some police departments, what is called “crime analysis”
consist of mapping crimes for command staff and
producing crime statistics. In other agencies, crime analysis
might mean focusing on analyzing various police reports
and suspect information to help investigators in major crime
units. Crime analysis is proceeding of analyzing crime.
More specifically, crime analysis is the breaking up of acts
committed in violation of laws into their parts to find out
their nature and reporting, some analysis [4]. The role of the
crime analysts varies from agency to agency. Statement of
these findings is the objective of most crime analysis to find
meaningful information in vast amounts of data and
disseminate this information to officers and investigators in
the field to assist in their efforts to apprehend criminals and
suppress criminal activity. Assessing crime through
analysis also helps in crime prevention efforts [4],[7],[10].
II. PROBLEM STATEMENT
We propose to implement a model that could help us to extract
crime patterns. These patterns will be applied to some data
mining algorithms such as association rules mining and
clustering to classify crime records on the basis of the values
of attributes crime. Applying such algorithms will illustrate the
overall results of using both algorithms to perform better
results rather in association rule mining or in clustering. The
scenarios generated by the system could be easily presented in
human language which might be used by Law Enforcement
officers to help them decided a crime prevention strategy.
III. PROBLEM SOLUTION
Law enforcement agencies today are faced a large volume of
data that must be preprocessed and transformed into useful
information. Data mining can improve crime analysis and aid
in reducing and preventing crime. The purpose of this study to
explore the applicability of data mining techniques in the
efforts of crime analysis and prevention. The data was
collected manually. Our proposed model will be able to extract
crime patterns by using clustering to classify crime records on
the basis of the values of crime attributes.
Cluster analysis: Grouping a set of data objects into
clusters. Clustering is unsupervised classification: no
predefined Classes. Simple K-Means clustering algorithm is
used in this paper. K-Means algorithm clusters the data
members groups were m is predefined. Input-Crime type,
Number of clusters, Number of Iteration Initial seeds might
produce an important role in the final results.
Step 1: Randomly Choose cluster centers.
Step 2: Assign instance to cluster based on
their distance to the cluster centers.
Step 3: Centers of clusters are adjusted.
Step 4: go to Step 1 until convergence.
Step 5: Output X0,X1,X2,X3.
Output
Table 2: Confusion Matrix
All of these values are derived from information provided
from the truth table, also known as a confusion matrix,
provides the actual and predicted classifications from the
predictor.
TPR= a/a+b………………..(2)
FPR = b/b+d……………….(3)
Accuracy= a+d/a+b+c+d…..(4)
Precision= a/a+b…………...(5)
The mean idea is to define k centers, one for each cluster.
These centers should be placed in a cunning way because of
Different location causes different result. So, the better choice
is to place them as much as possible far away from each other.
The next step is to take each point belonging to a given data
set and associate it to the nearest center. the first step is
completed and an early group age is done. At this point we
need to re-calculate k new centroids as barycenter of the
clusters resulting from the previous step. After we have these k
new centroids, a new binding has to be done between the same
data set points and the nearest new center. A loop has been
generated. As a result of this loop we may notice that the k
centers change their location step by step until no more
changes are done or in other words centers do not move any
more. Finally, this algorithm aims at minimizing an
objective function know as squared error function given by:
J(v)= ( )2 1 1 xi vj c i ci j −∑∑ = = (1)…..(6)
Whereas,
‘||xi - vj||’ is the Euclidean distance between xi and vj
‘ci’ is the number of data points in ith cluster. ‘c’ is the
number of cluster centers.
The K-Mean algorithm is fast, robust and easier to
understand. and gives best results when data set are distinct or
well separated from each other.
IV. CONCLUSION
An acceptable model for data mining which comes up with
excellent results of analyzing crime data set; it requires huge
historical data that can be used for creating and testing the
model.

More Related Content

What's hot

Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python CloudTechnologies
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveBenjamin Ang
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 

What's hot (20)

Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
Mobile security
Mobile securityMobile security
Mobile security
 
Walker, Chapter 13
Walker, Chapter 13Walker, Chapter 13
Walker, Chapter 13
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Big data mining
Big data miningBig data mining
Big data mining
 
Steganography
SteganographySteganography
Steganography
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Web mining
Web miningWeb mining
Web mining
 

Similar to Crime Data Analysis, Visualization and Prediction using Data Mining

A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGIRJET Journal
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docpraveena06
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysisijdmtaiir
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysisijdmtaiir
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET Journal
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction ReportRohit Dandona
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGIJDKP
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSameer Darekar
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 

Similar to Crime Data Analysis, Visualization and Prediction using Data Mining (20)

A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.doc
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysis
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysis
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
 
Bs4301396400
Bs4301396400Bs4301396400
Bs4301396400
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 

Recently uploaded

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 

Recently uploaded (20)

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 

Crime Data Analysis, Visualization and Prediction using Data Mining

  • 1. Crime Data Analyis Using Data Mining for Crime Prediction Anavadya Shibu; Anish S. A.; Gokul Krishnan S.;Vijayalekshmi V. R. S8 Computer Science and Engineering Mohandas College of Engineering and Technology Anad, Nedumangad, Thiruvananthapuram -695544 Mrs. Prathibha S. Nair, Assistant Professor, Department of Computer Science and Engineering, Mohandas College of Engineering and Technology Anad, Nedumangad, Thiruvananthapuram -695544 Abstract— This project presents a general idea about the model of Data Mining techniques and diverse crimes. It also provides an inclusive survey of competent and valuable techniques on data mining for crime data analysis. The objective of the data mining is to recognize patterns in criminal manners in order to predict crime anticipate criminal activity and prevent it. This project implements a novel data mining techniques like KNN, Text Clustering, IR tree for investigating the crime data sets and sorts out the accessible problems. The collective knowledge of various data mining algorithms tend certainly to afford an enhanced, incorporated, and precise result over the crime prediction in the banking sectors Our law enforcement organizations require to be adequately outfitted to defeat and prevent the crime. This project is developed using Java as front-end and MySQL as back-end. Supporting applications like Sunset, NetBeans are used to make the portal more interactive. Keywords-component; formatting; style; styling; insert (key words) I. INTRODUCTION Data Mining or Knowledge Discovery in Databases (KDD in simple words is nontrivial extraction of implicit, previously unknown, and potentially useful information from data [1],[2],[3]. It deals with the discovery of hidden knowledge, unexpected patterns and new rules from large databases. KDD is the process of indentifying a valid, potentially, useful and ultimately understandable structure in data. Data mining represents of the emerging field that can be used a wide disciplinary of applications including marketing, banking, airlines and many other fields that highly affect the communities. Crime analyzes is one of these important applications of data mining. Data mining contains many tasks and techniques including Classification, Association, Clustering, Prediction each of them has its own importance and applications [1],[2],[ 3]. Advances in technology, which allow analyzes of large quantities of data, are the foundation for the for relatively new field known as crime analyze. Crime analyzes is an emerging field in law enforcement without standard definitions. This makes it difficult to determine the crime analyzes focus for agencies that are new to the field. In some police departments, what is called “crime analysis” consist of mapping crimes for command staff and producing crime statistics. In other agencies, crime analysis might mean focusing on analyzing various police reports and suspect information to help investigators in major crime units. Crime analysis is proceeding of analyzing crime. More specifically, crime analysis is the breaking up of acts committed in violation of laws into their parts to find out their nature and reporting, some analysis [4]. The role of the crime analysts varies from agency to agency. Statement of these findings is the objective of most crime analysis to find meaningful information in vast amounts of data and disseminate this information to officers and investigators in the field to assist in their efforts to apprehend criminals and suppress criminal activity. Assessing crime through analysis also helps in crime prevention efforts [4],[7],[10]. II. PROBLEM STATEMENT We propose to implement a model that could help us to extract crime patterns. These patterns will be applied to some data mining algorithms such as association rules mining and clustering to classify crime records on the basis of the values of attributes crime. Applying such algorithms will illustrate the overall results of using both algorithms to perform better results rather in association rule mining or in clustering. The
  • 2. scenarios generated by the system could be easily presented in human language which might be used by Law Enforcement officers to help them decided a crime prevention strategy. III. PROBLEM SOLUTION Law enforcement agencies today are faced a large volume of data that must be preprocessed and transformed into useful information. Data mining can improve crime analysis and aid in reducing and preventing crime. The purpose of this study to explore the applicability of data mining techniques in the efforts of crime analysis and prevention. The data was collected manually. Our proposed model will be able to extract crime patterns by using clustering to classify crime records on the basis of the values of crime attributes. Cluster analysis: Grouping a set of data objects into clusters. Clustering is unsupervised classification: no predefined Classes. Simple K-Means clustering algorithm is used in this paper. K-Means algorithm clusters the data members groups were m is predefined. Input-Crime type, Number of clusters, Number of Iteration Initial seeds might produce an important role in the final results. Step 1: Randomly Choose cluster centers. Step 2: Assign instance to cluster based on their distance to the cluster centers. Step 3: Centers of clusters are adjusted. Step 4: go to Step 1 until convergence. Step 5: Output X0,X1,X2,X3. Output Table 2: Confusion Matrix All of these values are derived from information provided from the truth table, also known as a confusion matrix, provides the actual and predicted classifications from the predictor. TPR= a/a+b………………..(2) FPR = b/b+d……………….(3) Accuracy= a+d/a+b+c+d…..(4) Precision= a/a+b…………...(5) The mean idea is to define k centers, one for each cluster. These centers should be placed in a cunning way because of Different location causes different result. So, the better choice is to place them as much as possible far away from each other. The next step is to take each point belonging to a given data set and associate it to the nearest center. the first step is completed and an early group age is done. At this point we need to re-calculate k new centroids as barycenter of the clusters resulting from the previous step. After we have these k new centroids, a new binding has to be done between the same data set points and the nearest new center. A loop has been generated. As a result of this loop we may notice that the k centers change their location step by step until no more changes are done or in other words centers do not move any more. Finally, this algorithm aims at minimizing an objective function know as squared error function given by: J(v)= ( )2 1 1 xi vj c i ci j −∑∑ = = (1)…..(6) Whereas, ‘||xi - vj||’ is the Euclidean distance between xi and vj ‘ci’ is the number of data points in ith cluster. ‘c’ is the number of cluster centers. The K-Mean algorithm is fast, robust and easier to understand. and gives best results when data set are distinct or well separated from each other. IV. CONCLUSION An acceptable model for data mining which comes up with excellent results of analyzing crime data set; it requires huge historical data that can be used for creating and testing the model.