SlideShare a Scribd company logo
Crime rate analysis using K-NN in python
Abstract:
Crime rate is increasing now-a-days in many countries. In today's world with such higher
crime rate and brutal crime happening, there must be some protection against this crime. Here we
introduced a system by which crime rate can be reduced. Crime data must be fed into the system.
We introduced data mining algorithm to predict crime. KNN algorithm plays an important role in
analyzing and predicting crimes. KNN algorithm will cluster co-offenders, collaboration and
dissolution of organized crime groups, identifying various relevant crime patterns, hidden links,
link prediction and statistical analysis of crime data. This system will prevent crime occurring in
society. Crime data is analyzed which is stored in the database. Data mining algorithm will
extract information and patterns from database.
System will group crime. Clustering will be done based on places where crime occurred,
gang who involved in crime and the timing crime took place. This will help to predict crime
which will occur in future. Admin will enter crime details into the system which is required for
prediction. Admin can view criminal historical data. Crime incident prediction depends mainly
on the historical crime record and various geospatial and demographic information.
Existing System:
Data mining in the study and analysis of criminology can be categorized into main
areas, crime control and crime suppression. De Bruin et. al. [1] introduced a framework for crime
trends using a new distance measure for comparing all individuals based on their profiles and
then clustering them accordingly. Manish Gupta et. al. [2]. highlights the existing systems used
by Indian police as e-governance initiatives and also proposes an interactive query based
interface as crime analysis tool to assist police in their activities. He proposed interface which is
used to extract useful information from the vast crime database maintained by National Crime
Record Bureau (NCRB) and find crime hot spots using crime data mining techniques such as
clustering etc. The effectiveness of the proposed interface has been illustrated on Indian crime
records.
Disadvantages:
Users who don't have internet connection can't access the system.
Admin must enter correct records otherwise system will provide wrong information
ProposedSystem:
The procedure is given below:
1. First we take crime dataset
2. Filter dataset according to requirement and create new dataset which has attribute according
to analysis to be done
3. Open rapid miner tool and read excel file of crime dataset and apply "Replace Missing value
operator" on it and execute operation
4. Perform "Normalize operator" on resultant dataset and execute operation
5. Perform k means clustering on resultant dataset formed after normalization and execute
operation
6. From plot view of result plot data between crimes and get required cluster
7. Analysis can be done on cluster formed
Advantages:
Helps to prevent crime in society
System will keep historical record of crime.
System is user friendly
Saves time
SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 1 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Python 3.6
IDE : PyCham
UML : Star UML
DFD : DFD Drawer
Implemented by
Development team : Cloud Technologies
Website : http://www.cloudstechnologies.in
Contact : 8121953811, 040-65511811

More Related Content

What's hot

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
BigDataCloud
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
KrupaliDobariya
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
Hi Tech Criminal Justice
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
Benjamin Ang
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
Dr. Stylianos Kampakis
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Colin Bartram
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
ssuseref08b9
 
Object detection
Object detectionObject detection
Object detection
Somesh Vyas
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
ranjit banshpal
 
3D Searching by ruchi
3D Searching by ruchi3D Searching by ruchi
3D Searching by ruchi
Ruchi Ritambara
 
Microposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on TwitterMicroposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on Twitter
azubiaga
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
GYamini22
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
Rohit Dandona
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICE
VamshidharSingh
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
Makrand Patil
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
Ashfaqul Haque John
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
Security Bootcamp
 

What's hot (20)

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Object detection
Object detectionObject detection
Object detection
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
3D Searching by ruchi
3D Searching by ruchi3D Searching by ruchi
3D Searching by ruchi
 
Microposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on TwitterMicroposts2015 - Social Spam Detection on Twitter
Microposts2015 - Social Spam Detection on Twitter
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
face recognition
face recognitionface recognition
face recognition
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICE
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 

Similar to Crime rate analysis using k nn in python

Case.pptx
Case.pptxCase.pptx
Case.pptx
ParthBhadani3
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic final
Twaha Minai
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
Anavadya Shibu
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
Daniel John
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
Kusum Sankhala
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
IRJET Journal
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
 
Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduce
Kaushik Rajan
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
gerogepatton
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
ijaia
 
Crime report
Crime reportCrime report
Crime report
Adarsh Uttarkar
 

Similar to Crime rate analysis using k nn in python (20)

Case.pptx
Case.pptxCase.pptx
Case.pptx
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic final
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduce
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Crime report
Crime reportCrime report
Crime report
 

More from CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
CloudTechnologies
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
CloudTechnologies
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
CloudTechnologies
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
CloudTechnologies
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
CloudTechnologies
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
CloudTechnologies
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
CloudTechnologies
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
CloudTechnologies
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
CloudTechnologies
 
Io t projects
Io t projectsIo t projects
Io t projects
CloudTechnologies
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
CloudTechnologies
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
CloudTechnologies
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
CloudTechnologies
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
CloudTechnologies
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
CloudTechnologies
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
CloudTechnologies
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
CloudTechnologies
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
CloudTechnologies
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
CloudTechnologies
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
CloudTechnologies
 

More from CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 

Recently uploaded

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 

Recently uploaded (20)

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 

Crime rate analysis using k nn in python

  • 1. Crime rate analysis using K-NN in python Abstract: Crime rate is increasing now-a-days in many countries. In today's world with such higher crime rate and brutal crime happening, there must be some protection against this crime. Here we introduced a system by which crime rate can be reduced. Crime data must be fed into the system. We introduced data mining algorithm to predict crime. KNN algorithm plays an important role in analyzing and predicting crimes. KNN algorithm will cluster co-offenders, collaboration and dissolution of organized crime groups, identifying various relevant crime patterns, hidden links, link prediction and statistical analysis of crime data. This system will prevent crime occurring in society. Crime data is analyzed which is stored in the database. Data mining algorithm will extract information and patterns from database. System will group crime. Clustering will be done based on places where crime occurred, gang who involved in crime and the timing crime took place. This will help to predict crime which will occur in future. Admin will enter crime details into the system which is required for prediction. Admin can view criminal historical data. Crime incident prediction depends mainly on the historical crime record and various geospatial and demographic information. Existing System: Data mining in the study and analysis of criminology can be categorized into main areas, crime control and crime suppression. De Bruin et. al. [1] introduced a framework for crime trends using a new distance measure for comparing all individuals based on their profiles and then clustering them accordingly. Manish Gupta et. al. [2]. highlights the existing systems used by Indian police as e-governance initiatives and also proposes an interactive query based interface as crime analysis tool to assist police in their activities. He proposed interface which is used to extract useful information from the vast crime database maintained by National Crime Record Bureau (NCRB) and find crime hot spots using crime data mining techniques such as clustering etc. The effectiveness of the proposed interface has been illustrated on Indian crime records. Disadvantages: Users who don't have internet connection can't access the system. Admin must enter correct records otherwise system will provide wrong information ProposedSystem: The procedure is given below: 1. First we take crime dataset 2. Filter dataset according to requirement and create new dataset which has attribute according to analysis to be done
  • 2. 3. Open rapid miner tool and read excel file of crime dataset and apply "Replace Missing value operator" on it and execute operation 4. Perform "Normalize operator" on resultant dataset and execute operation 5. Perform k means clustering on resultant dataset formed after normalization and execute operation 6. From plot view of result plot data between crimes and get required cluster 7. Analysis can be done on cluster formed Advantages: Helps to prevent crime in society System will keep historical record of crime. System is user friendly Saves time SYSTEM CONFIGURATION: Hardware requirements: Processer : Any Update Processer Ram : Min 1 GB Hard Disk : Min 100 GB Software requirements: Operating System : Windows family Technology : Python 3.6 IDE : PyCham UML : Star UML DFD : DFD Drawer Implemented by Development team : Cloud Technologies Website : http://www.cloudstechnologies.in Contact : 8121953811, 040-65511811