SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7679
Crime Analysis using Data Mining and Data Analytics
S. Bodare1, S. Kurkute2, M. Akash3, R. Pawar4
1,2,3,4Student at Svpm College of Engineerin, Malegaon(BK)
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Crime analysis and prevention is a systematic
approach for identifying and analyzing patterns andtrendsin
crime. Our system can predict regions which have high
probability for crimeoccurrenceandcanvisualizecrimeprone
areas. With the increasing advent of computerized systems,
crime data analysts can help the Law enforcement officers to
speed up the process of solving crimes. Using the concept of
data mining we can extract previously unknown, useful
information from an unstructured data. Here we have an
approach between computer science and criminal justice to
develop a data mining procedure the can help solve crimes
faster. Instead of focusing on causes of crime occurrence like
criminal background of offender, political enmity etc. We are
focusing mainly on crime factors of each day. Crime is one of
the most important social problems in the country, affecting
public safety, children development, and adult socioeconomic
status. Understanding what factors cause higher crime is
critical for policy makers in their efforts to reduce crime and
increase citizens life quality. Wetackleafundamentalproblem
in our paper: crime rate inference at the neighborhood level.
Traditional approaches have used demographics and
geographical influences to estimate crime rates in a region.
Key Words: Data Mining, Linear regression, Crime rate
analysis,Data Analytics
1. INTRODUCTION
The built environment based crime research until now has
rarely focused on robbery. The reason for this could be the
difficulty in knowing exactly where a robbery happened, or
the precautions against robbery seemedlessapplicablethan
other crimes such as burglary and thus the research being
perceived more worthwhile. However, street robbery is a
daily fear in urban life and reducing the type of settings that
is most likely to take place should be the aim for achieving
urban environments that are used effectively, day andnight,
for a sustainable urban development[3].
Regression is one of a powerful tool for predicting the
future values based on previous data sets. The use of
prediction in crime analysis can make crime free region.The
proposed technique can predict those regions which are
sensitive to criminal activities like theft, murder, rape, Anti-
social behavior, Domestic violence etc. The scheme uses the
data sets taken from the Indian governmentwebsiteand can
be used to predict the number of criminal activitiesinfuture.
The data will then supplied with other factors like criminal
type, age, month and year to the regressionmodel whichwill
predict the future value for the criminal activities. . This
predicted number of activities will indicate thattheregion is
high sensitive or low sensitive. If the predicted number will
be high then the region is high sensitive and if low then the
region is low sensitive. Understanding how to control crime
is important because exposures to violence and crime have
been unusually high in the India for several decades and,
while declining, they remain high.
Sensing technologies and large-scale computing
infrastructures have produced a variety of big data in urban
spaces. These heterogeneous data convey rich knowledge
about city dynamics and enable us to address many urban
challenges. For example, human mobility data could help
improve the efficiency of transportation systems such as
estimating real-time traffic flow and forecasting travel time
for road segments. With the similar motivation, we employ
such modern urban data for crime rate inference. In the
criminology literature, researchers have studied the
relationship between crime and various features (social,
demographics, and geographic factors). Examples are
historical crime records, education, ethnicity, income level,
unemployment, and spatial proximity.
In data mining, newer types of data are used. For
example, studies use twitter to predict crime, and cellphone
data to evaluate crime and social theories at scale. Overall,
existing work on crime prediction can be categorized into
three paradigms. Time-centric paradigm. This line of work
focuses on the temporal dimension of crime incidents. For
example, Mohler et. al. propose to useaself-exciting point
process to model the crime and gain insights into the
temporal trends in the rate of burglary. Existingworksin the
fields of criminology, sociology, psychology and economics
tend to mainly explore relationships between criminal
activity and socio-economic variables such as education,
ethnicity, income level, and unemployment [5]. In another
study, Ratcliffe investigates the temporal constraints on
crime, and propose an offender travel and opportunity
model. His findings suggest that a proportion of offending is
driven by the availability of opportunities presented in the
routine lives of offenders. Place-centric paradigm. Theories
of crime can be divided into those that seek to explain the
development of criminal offenders, and those that seek to
explain the development of criminal events[4].
Crime rate is increasing now-a-days in many countries.
In today’s world with such higher crime rate and brutal
crime happening, there must be someprotectionagainstthis
crime. Here we introduced a system by which crime ratecan
be predict. Crime data must feed into the system. We
introduced data mining algorithm to predict crime.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7680
Regression Analysis, plays an important role in analyzing
and predicting crimes. Regression Analysis will cluster co-
offenders, collaboration and dissolution of organized crime
groups, identifying various relevant crime patterns, hidden
links, link prediction and statistical analysis of crime data.
This system will prevent crime occurring in society.
Crime data is analyzed which is stored in the database.
Data mining algorithm will extract information andpatterns
from database. System will groupcrime.RegressionAnalysis
will be done based on places where crime occurred, type of
crime and the timing crime took place. This wil help to
predict crime. Admin will enter crime detailsintothesystem
which is required for prediction. Admin can view criminal
historical data. Crime incident predictiondependsmainlyon
the historical crime record and various geospatial and
demographic information.
1.1 System Architecture
A description of the program architecture is presented.
Subsystem design or Block diagram, Package Diagram,
Deployment diagram with description is to be presented.
Fig.System Architecture
1.2 Dataset
A data set is a collection of data. Most commonly a data
set corresponds to the contents of a single database table, or
a single statistical data matrix, where every column of the
table represents a particular variable, and each row
corresponds to a given member of the data set in question.
Several characteristics define a data set’s structure and
properties. These include the number and types of the
attributes or variables, and various statistical measures.
Firstly, We collect data set from Indian government website
as data.gov.in.[1] The given dataset is in well trained
manner. the data file is in CSV format. The dataset contains
different types of fields such as state, crime head, and crime
taken by gender in different age as Femaleagebelow18,
Maleagebelow18, female age between 20-25 and so on.
1.3 Data Analysis
In today’s business, data analysis is playing a role in
making decisions more scientific and helping the business
achieve effective operation. Data mining is a particular data
analysis technique that focuses on modeling and knowledge
discovery for predictive rather than purely descriptive
purposes, while business intelligence covers data analysis
that relies heavily on aggregation, focusing mainly on
business information. Here, We analysis the given dataset.
Different Operations are performed in data analysis such as
Filter data according requirement, Fill missing values,
Remove noise. So well Data analysis is a process of
inspecting, cleansing, transforming, and modeling data with
the goal of discovering useful information, informing
conclusions, and supporting decision making.[3]
1.3 Linear Regression
In statistics, linear regression is a linear approach to
modeling the relationship between a scalar response (or
dependent variable) and one or more explanatory variables
(or independent variables). The case of one explanatory
variable is called simple linearregression.Formorethan one
explanatory variable, the process is called multiple linear
regressions. Linear regression is mostly usedas, Ifthegoal is
prediction, or forecasting, or error reduction,[clarification
needed] linear regression can be used to fit a predictive
model to an observed data set of values of the response and
explanatory variables. After developing such a model, if
additional values of the explanatory variables are collected
without an accompanying response value, the fitted model
can be used to make a prediction of theresponse.Regression
analysis is also used to understand which among the
independent variables are relatedtothedependentvariable,
and to explore the forms of these relationships.
1.4 Prediction Record
Here, final output is predicted which is in the form of pie
chart.
2. Inference Model
Linear regression is a basic and commonly used type of
predictive analysis.
2.1 Math and Equations
In the regression there is simple Mathematics equations
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7681
which is useful to solve our algorithm:
2.2 Algorithm
The algorithm as below Steps:-
1. SUB Regress(x,y,n,al,a0,syx,r2)
2. sumx=0:sumxy=0:st=0
3. sumy=0:sumx2=0:sr=0
4. DOFOR i=1,n
5. sumx=sumx+xi
6. sumy=sumy+yi
7. sumxy=sumxy+xi*yi
8. sumx2=sumx2+xi*xi
9. END DO
10. xm=sumx/n
11. ym=sumy/n
12.a1=(n*sumxy-sumx*sumy)/(n*sumx2-sumx*sumx)
13. a0=ym-a1*xm
14. DOFOR i=1,n
15. st=st+(yi−ym)2
16. sr=sr+(yi−al∗xi−a0)2
17. END DO 18. syx (sr/(n−2))1/2
19. r2=(st-sr)/st
20. END Regress
3. Result
In this project we predict different states in India. We
know that India is one of biggest country in world which
have 7th largest country. In that India has 1.35 billion
population. It take second largest population in world. Very
big population make many problems in that Crime is one of
biggest problem for India. We contribute little bit help for
Indian peoples. From our project people can understand
which state have highest crime and take awareness
campaign in particular area.
3.1 Different State fine from Database
In this topic we going to collect dataset from
www.data.gov.in[1]. In that dataset we got all states in India
and number of male, females which have their age ex. Male
below 18 year, Male between 18_30 year etc. Separate the
state with different crime like Rape, Assault, Dowry etc.
3.2 Graphs For Indication
Peoples can not understand prediction easily for that we
include graphs for every attributes.Followinggraphindicate
that Rape cases in India which conducted by different age
group and different colours shows different states.
3.3 Final Table For Prediction
CONCLUSION
We handle different attribute relates to crime dataset.
With the help of that attribute, we predict which attribute
conducted crime with respect to states. So with the help of
predicted output, we take different precautions where the
maximum amount of crime committed.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7682
REFERENCES
[1] Indian Government Portal –https://data.gov.in
[2] Hongjian Wang, Huaxiu Yao, Daniel Kifer, Corina Graif,
Zhenhui Li,Non-Stationary Model for crime rate
inference using modernurbandata,2332-7790(c)2017
IEEE.1-13
[3] Wikipedia-http://Wikipedia.com
[4] S. D. Johnson,”A brief history of the analysis of crime
concentration”, European Journal of Applied
Mathematics, 21 (4-5) (2010) 349–370,
http://journals.cambridge.org/article_S095679251000
0082
[5] Chhaya Chauhan, Smriti Sehgal, ”A REVIEW: CRIME
ANALYSIS USING DATA MINING TECHNIQUES AND
ALGORITHMS” 2017 IEEE

More Related Content

What's hot

Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-mining
mohammed albash
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
APNIC
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
Aashri Tandon
 
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingSAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingJohn Michael Croft
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
Hi Tech Criminal Justice
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
Prodapt Solutions
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Frank Smilda
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
Anavadya Shibu
 
U24149153
U24149153U24149153
U24149153
IJERA Editor
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
ijaia
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Colin Bartram
 
Ashish sonal_banglore
Ashish sonal_bangloreAshish sonal_banglore
Ashish sonal_bangloreIPPAI
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
Heta Parekh
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
IJDKP
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
IJDKP
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
eSAT Journals
 

What's hot (19)

Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-mining
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingSAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
U24149153
U24149153U24149153
U24149153
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Ashish sonal_banglore
Ashish sonal_bangloreAshish sonal_banglore
Ashish sonal_banglore
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 

Similar to IRJET- Crime Analysis using Data Mining and Data Analytics

Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
AIRCC Publishing Corporation
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
nikita kapil
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
IRJET Journal
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
gerogepatton
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
IJSRD
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
IJERA Editor
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
IRJET Journal
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
Fahad Almassoud
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
IRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
IRJET Journal
 
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET Journal
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
KiranKumar757501
 

Similar to IRJET- Crime Analysis using Data Mining and Data Analytics (20)

Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Technical Seminar
Technical SeminarTechnical Seminar
Technical Seminar
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
 
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

IRJET- Crime Analysis using Data Mining and Data Analytics

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7679 Crime Analysis using Data Mining and Data Analytics S. Bodare1, S. Kurkute2, M. Akash3, R. Pawar4 1,2,3,4Student at Svpm College of Engineerin, Malegaon(BK) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Crime analysis and prevention is a systematic approach for identifying and analyzing patterns andtrendsin crime. Our system can predict regions which have high probability for crimeoccurrenceandcanvisualizecrimeprone areas. With the increasing advent of computerized systems, crime data analysts can help the Law enforcement officers to speed up the process of solving crimes. Using the concept of data mining we can extract previously unknown, useful information from an unstructured data. Here we have an approach between computer science and criminal justice to develop a data mining procedure the can help solve crimes faster. Instead of focusing on causes of crime occurrence like criminal background of offender, political enmity etc. We are focusing mainly on crime factors of each day. Crime is one of the most important social problems in the country, affecting public safety, children development, and adult socioeconomic status. Understanding what factors cause higher crime is critical for policy makers in their efforts to reduce crime and increase citizens life quality. Wetackleafundamentalproblem in our paper: crime rate inference at the neighborhood level. Traditional approaches have used demographics and geographical influences to estimate crime rates in a region. Key Words: Data Mining, Linear regression, Crime rate analysis,Data Analytics 1. INTRODUCTION The built environment based crime research until now has rarely focused on robbery. The reason for this could be the difficulty in knowing exactly where a robbery happened, or the precautions against robbery seemedlessapplicablethan other crimes such as burglary and thus the research being perceived more worthwhile. However, street robbery is a daily fear in urban life and reducing the type of settings that is most likely to take place should be the aim for achieving urban environments that are used effectively, day andnight, for a sustainable urban development[3]. Regression is one of a powerful tool for predicting the future values based on previous data sets. The use of prediction in crime analysis can make crime free region.The proposed technique can predict those regions which are sensitive to criminal activities like theft, murder, rape, Anti- social behavior, Domestic violence etc. The scheme uses the data sets taken from the Indian governmentwebsiteand can be used to predict the number of criminal activitiesinfuture. The data will then supplied with other factors like criminal type, age, month and year to the regressionmodel whichwill predict the future value for the criminal activities. . This predicted number of activities will indicate thattheregion is high sensitive or low sensitive. If the predicted number will be high then the region is high sensitive and if low then the region is low sensitive. Understanding how to control crime is important because exposures to violence and crime have been unusually high in the India for several decades and, while declining, they remain high. Sensing technologies and large-scale computing infrastructures have produced a variety of big data in urban spaces. These heterogeneous data convey rich knowledge about city dynamics and enable us to address many urban challenges. For example, human mobility data could help improve the efficiency of transportation systems such as estimating real-time traffic flow and forecasting travel time for road segments. With the similar motivation, we employ such modern urban data for crime rate inference. In the criminology literature, researchers have studied the relationship between crime and various features (social, demographics, and geographic factors). Examples are historical crime records, education, ethnicity, income level, unemployment, and spatial proximity. In data mining, newer types of data are used. For example, studies use twitter to predict crime, and cellphone data to evaluate crime and social theories at scale. Overall, existing work on crime prediction can be categorized into three paradigms. Time-centric paradigm. This line of work focuses on the temporal dimension of crime incidents. For example, Mohler et. al. propose to useaself-exciting point process to model the crime and gain insights into the temporal trends in the rate of burglary. Existingworksin the fields of criminology, sociology, psychology and economics tend to mainly explore relationships between criminal activity and socio-economic variables such as education, ethnicity, income level, and unemployment [5]. In another study, Ratcliffe investigates the temporal constraints on crime, and propose an offender travel and opportunity model. His findings suggest that a proportion of offending is driven by the availability of opportunities presented in the routine lives of offenders. Place-centric paradigm. Theories of crime can be divided into those that seek to explain the development of criminal offenders, and those that seek to explain the development of criminal events[4]. Crime rate is increasing now-a-days in many countries. In today’s world with such higher crime rate and brutal crime happening, there must be someprotectionagainstthis crime. Here we introduced a system by which crime ratecan be predict. Crime data must feed into the system. We introduced data mining algorithm to predict crime.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7680 Regression Analysis, plays an important role in analyzing and predicting crimes. Regression Analysis will cluster co- offenders, collaboration and dissolution of organized crime groups, identifying various relevant crime patterns, hidden links, link prediction and statistical analysis of crime data. This system will prevent crime occurring in society. Crime data is analyzed which is stored in the database. Data mining algorithm will extract information andpatterns from database. System will groupcrime.RegressionAnalysis will be done based on places where crime occurred, type of crime and the timing crime took place. This wil help to predict crime. Admin will enter crime detailsintothesystem which is required for prediction. Admin can view criminal historical data. Crime incident predictiondependsmainlyon the historical crime record and various geospatial and demographic information. 1.1 System Architecture A description of the program architecture is presented. Subsystem design or Block diagram, Package Diagram, Deployment diagram with description is to be presented. Fig.System Architecture 1.2 Dataset A data set is a collection of data. Most commonly a data set corresponds to the contents of a single database table, or a single statistical data matrix, where every column of the table represents a particular variable, and each row corresponds to a given member of the data set in question. Several characteristics define a data set’s structure and properties. These include the number and types of the attributes or variables, and various statistical measures. Firstly, We collect data set from Indian government website as data.gov.in.[1] The given dataset is in well trained manner. the data file is in CSV format. The dataset contains different types of fields such as state, crime head, and crime taken by gender in different age as Femaleagebelow18, Maleagebelow18, female age between 20-25 and so on. 1.3 Data Analysis In today’s business, data analysis is playing a role in making decisions more scientific and helping the business achieve effective operation. Data mining is a particular data analysis technique that focuses on modeling and knowledge discovery for predictive rather than purely descriptive purposes, while business intelligence covers data analysis that relies heavily on aggregation, focusing mainly on business information. Here, We analysis the given dataset. Different Operations are performed in data analysis such as Filter data according requirement, Fill missing values, Remove noise. So well Data analysis is a process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision making.[3] 1.3 Linear Regression In statistics, linear regression is a linear approach to modeling the relationship between a scalar response (or dependent variable) and one or more explanatory variables (or independent variables). The case of one explanatory variable is called simple linearregression.Formorethan one explanatory variable, the process is called multiple linear regressions. Linear regression is mostly usedas, Ifthegoal is prediction, or forecasting, or error reduction,[clarification needed] linear regression can be used to fit a predictive model to an observed data set of values of the response and explanatory variables. After developing such a model, if additional values of the explanatory variables are collected without an accompanying response value, the fitted model can be used to make a prediction of theresponse.Regression analysis is also used to understand which among the independent variables are relatedtothedependentvariable, and to explore the forms of these relationships. 1.4 Prediction Record Here, final output is predicted which is in the form of pie chart. 2. Inference Model Linear regression is a basic and commonly used type of predictive analysis. 2.1 Math and Equations In the regression there is simple Mathematics equations
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7681 which is useful to solve our algorithm: 2.2 Algorithm The algorithm as below Steps:- 1. SUB Regress(x,y,n,al,a0,syx,r2) 2. sumx=0:sumxy=0:st=0 3. sumy=0:sumx2=0:sr=0 4. DOFOR i=1,n 5. sumx=sumx+xi 6. sumy=sumy+yi 7. sumxy=sumxy+xi*yi 8. sumx2=sumx2+xi*xi 9. END DO 10. xm=sumx/n 11. ym=sumy/n 12.a1=(n*sumxy-sumx*sumy)/(n*sumx2-sumx*sumx) 13. a0=ym-a1*xm 14. DOFOR i=1,n 15. st=st+(yi−ym)2 16. sr=sr+(yi−al∗xi−a0)2 17. END DO 18. syx (sr/(n−2))1/2 19. r2=(st-sr)/st 20. END Regress 3. Result In this project we predict different states in India. We know that India is one of biggest country in world which have 7th largest country. In that India has 1.35 billion population. It take second largest population in world. Very big population make many problems in that Crime is one of biggest problem for India. We contribute little bit help for Indian peoples. From our project people can understand which state have highest crime and take awareness campaign in particular area. 3.1 Different State fine from Database In this topic we going to collect dataset from www.data.gov.in[1]. In that dataset we got all states in India and number of male, females which have their age ex. Male below 18 year, Male between 18_30 year etc. Separate the state with different crime like Rape, Assault, Dowry etc. 3.2 Graphs For Indication Peoples can not understand prediction easily for that we include graphs for every attributes.Followinggraphindicate that Rape cases in India which conducted by different age group and different colours shows different states. 3.3 Final Table For Prediction CONCLUSION We handle different attribute relates to crime dataset. With the help of that attribute, we predict which attribute conducted crime with respect to states. So with the help of predicted output, we take different precautions where the maximum amount of crime committed.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7682 REFERENCES [1] Indian Government Portal –https://data.gov.in [2] Hongjian Wang, Huaxiu Yao, Daniel Kifer, Corina Graif, Zhenhui Li,Non-Stationary Model for crime rate inference using modernurbandata,2332-7790(c)2017 IEEE.1-13 [3] Wikipedia-http://Wikipedia.com [4] S. D. Johnson,”A brief history of the analysis of crime concentration”, European Journal of Applied Mathematics, 21 (4-5) (2010) 349–370, http://journals.cambridge.org/article_S095679251000 0082 [5] Chhaya Chauhan, Smriti Sehgal, ”A REVIEW: CRIME ANALYSIS USING DATA MINING TECHNIQUES AND ALGORITHMS” 2017 IEEE