SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2084
Reporting and Management System for Online Crime
Manjula M1, Manoj Kumar P S2
1Assistant Professor, Atria Institute of Technology, Visvesvaraya Technological University, Bangalore
2Student, Atria Institute of Technology, Visvesvaraya Technological University, Bangalore
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The aim of this project is to develop an online
managing crime report system which is accessible to the
common public and the police department easily. The
system provides users with the information about the crime
rates of a desired area. This is useful for tourists who are
entering in an unvisited area. If the user enters in 100 meter
radius of a high alert area then he/she will be notified with
an alert message. The user gets notified about the different
crime rates in the area and can provide the safest path to
the desired destination. Also, the system registers the
complaints from the people through online web application
where they can upload images and videos of the crime and
it will be helpful for the police department in catching
criminals. The person can give complaint at any time.
Key Words: KNN Algorithm, AES Algorithm, K-Means
Algorithm.
1. INTRODUCTION
Crime is a part of illegal activities in human life. The rise
of population and complex society rises the range of anti-
social conducts that must be restricted by the government
through the military and different organizations
particularly the Police Force. There are many current
crime management systems which faces several
difficulties, as there is no means to report crime instantly
other than phone calls, messaging or face-to-face
compliant filing. Hence, we have proposed an online crime
reporting system which allows the user to file complaints
or missing reports and keep a track of it. There are 3
categories that a usercan file; Complaint,CrimeReport and
Missing Report and can see all the status of what action
has been taken by the admin. To file any of the above 3
complaints, the user should register in to the system and
provide his right credentials to file them. The crime
reporting system project also allows other users who
doesn’t want to register but can check the crimes
happening at his/her or any other area, has to just
provide the pin code and in return the system displays
the list of crimes if any filed. The offline i.e. the
unregistered user can also take advantage of checking the
missing person details, but he/she is refrained from
getting complaints done by the users. The Front End of
the crime reporting system is done using Android Studio
and SQL serves as a backend to store books lists and
inventory data. The system, has both the user as well the
Admin Part, the role of admin is to just check all the 3
modules or categories and update their status likewise.
This system helps the users in tracking any report filed to
the law and take an advantage of reporting any complaint
from anywhere bringing the whole system online.
1.1 Literature Survey
1. Sunil Yadav illustrate that how social
development may lead to crime prevention so
that to increase the predictive accuracy
supervised, semi-supervised and unsupervised
learning technique are used and also k-means is
used to create number of clusters.
2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi
have analysed, the main objective of this paper is
to classify clustered crimes based on occurrence
frequency during different years. Data mining is
used extensively in terms of analysis,
investigation and discovery of patterns for
occurrenceofdifferent crimes.
3. Shyam Varan Nath have used the clustering
algorithm for a data mining approach to help
detect the crimes patterns and speed up the
process of solving crime. We will look at k-
means clustering with some enhancements to
aid in the process of identification of crime
patterns.
2. Project Overview
The crime rates accelerate continuously and the crime
patterns are constantly changing. According to National
Crime Records Bureau, crime against women has
significantly increased in recent years. It has become the
most prior to the administration to enforce law and order
to reduce this increasing rate of the crime against
women. We illustrates how social development may lead
to crime prevention. So we are developing the system
which can used to detect and predict the crimes for the
area where the person or user currently stand. Crime
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2085
detection and analysis will be to generate the crime hot-
spots that will help in deployment of police at mostly
likely places of crime for any window of time, to allow
most effective utilization of police resources. The
developed model will reduce crimes and will help the
crime detection field in many ways that is from arresting
the criminals to reducing the crimes by carrying out
various necessary measures. We add the woman safety
module for security. When women press the power
button of android mobile 3 to 4 times then help message
send to relatives or police. Due to this we reduce crime
in the society and in country. Here we use module of
crime capture means user can capture the photo of
crime send topolice.
There is user or actors which are as follows,
1. Userhastheaccountandforaccessingthathe/she
must be provide the correct username andpassword.
2.Alluse-cases for thes of twareare presented.
Description of all main Use cases use case template is to be
provided.
3. A use case diagram in the Unified Modeling
Language (UML) is a type of behavioral diagram defined by
and created from a Use-case analysis. Its purpose is to
present a graphical overview of the functionality provided
by a system in terms of actors, their goals (represented as
use cases), and any dependencies between those use
cases. The main purpose of a use case diagram is to show
what system functions are performed for which actor.
Roles of the actors in the system can be depicted.
[A]AES Encryption Process
AES is an iterative rather than Feistel cipher. It is based
on substitution permutation network. It comprises of a
series of linked operations, some of which involve
replacing inputs by specific outputs (substitutions) and
others involve shuffling bits around(permutations).
Interestingly, AES performs all its computations on bytes
rather than bits. These 16 bytes are arranged in four
columns and four rows for processing as a matrix. Unlike
DES, the number of rounds in AES is variable and depends
on the length of the key. Each of these rounds uses a
different 128-bit round key, which is calculated from the
original AES key. In present day cryptography, AES is
widely adopted and supported in both hardware and
software. Till date, no practical cryptanalytic attacks
against AES have been discovered. Additionally, AES has
built-in flexibility of key length, which allows a degree of
future- proofing against progress in the ability to perform
exhaustive key searches. However, just as for DES, the AES
security is assured only if it is correctly implemented and
good key management is employed. The encryption
process uses a set of specially derived keys called round
keys. These reapplied, along with other operations, on an
array of data that holds exactly oneblock ofdata? The data
tobeencrypted.Thisarray we call the statearray.
You take the following AES steps of encryption for128-bit
block:
• Derive the set of round keys from the cipherkey.
• Initialize the state array with the block data
(plaintext).
• Add the initial round keyto the starting state array.
• Perform nine rounds of state manipulation.
Fig-1: AES Algorithm
The reason that the rounds have been listed as “nine
followed by a final tenth round” is because the tenth
round involves a slightly different manipulation from
the others. Theblock tobeencryptedisjusta sequence of
128 bits. AES works with byte quantities so we first
convert the 128 bits into 16 bytes. We say “convert,” but,
in reality, it is almost certainly stored this way already.
Operations in RSN/AES are performed on a two-
dimensional byte array of four rows and four columns.
At the start of the encryption, the 16 bytes of data,
numbered D0? D15, are loaded into the array as shown
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2086
in following
Table A. Each round of the encryption process
requires a series of steps to alter the state array. These
stepsinvolve four types of operations called:
1. SubBytes
2. ShiftRows
3. MixColum
ns [B]Data Mining
Data mining is a new technology, which helps
organizations to process data through algorithms to
uncover meaningful patterns and correlations from
large databases that otherwise may not be possible with
standard analysis and reporting. Data mining tools can
helps to understand the business better and also
improve future performance through predictive analysis
and make them proactive and allow knowledge driven
decisions. Issues related to information extraction fro
large databases, data mining field brings together
methods from several domains like Machine Learning,
Statistics, Pattern Recognition, Databases and
Visualizations. Data Mining fields find its application in
market analysis and, management like for example
customer relationship, management, cross selling,
market segmentation. It can also be used in risk analysis
and management for forecasting, customer retention,
improved underwriting, quality control, competitive
analysis and credit scoring. [C]System Architecture
Fig:2 System Architecture [D]Feasibility Analysis Np-hard
Np-Complete:
• What is P?
P is set of all decision problems which can be solved in
polynomial time by a deterministic.
Since it can be solved in polynomial time, it can be verified
in polynomial time.
Therefore P is a subset of NP.
P: Crime is a matter of major concern to society, it must be
checked. Although crime, being an integral part of
civilization, it can definitely be kept within limits. The task
of maintaining peace and order is delegated internally to
the police.
What is NP?
“NP” means “we can solve it in polynomial time if we can
break the normal rules of step-by-step computing”.
What is NP Hard?
A problem is NP-hard if an algorithm for solving it can be
translated into one for solving any NP-problem
(nondeterministic polynomial time) problem. NP-hard
therefore means” at least as hard as any NP-problem,”
although it might, in fact, be harder.
NP-Hard: It would be very difficult to only go through the
manual process of crime reporting to police portal.
So here in this case the P problem is NP hard.
i.e. P=NP-Hard
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2087
What is NP-Complete?
 Since this amazing”N” computer can also do anything
a normal computer can, we know that”P” problems
are also in”NP”.
 So, the easy problems are in”P” (and”NP”), but the
really hard ones are *only* in”NP”, and they are
called”NP-complete”.
 It is like saying there are things that People can
do (”P”), there are things that Super People can do
(”SP”), and there are things *only* Super Peoplecan
do (”SP-complete”).
NP-Complete: Crime detection and analysis will be to
generate the crime hot- spots that will help in deployment
of police at most likely places of crime for any given
window of time, to allow most effective utilization of
police resources.
[E]K – Nearest Neighbor NP Analysis
K–Nearest Neighbor algorithm is a Machine Learning
Classification Technique. It is used to classify a given
element into one of the classes which is closest to the
element. Consider a data set of ‘n’ samples and ‘d’
dimensions. There is a point of interest whose class we
want to determine on a two-dimensional plot. We
calculate the distance between the point of interest to all
other points in the data set.. If the data set is small with
less number of dimensions, this algorithm runs in a
reasonable amount of time. Since the time complexity of
K–Nearest Neighbor algorithm using Brute Force
Approach is the algorithm runs in polynomial time and
hence fall under P class of Problems.
3. CONCLUSION
The developed model will help reduce crimes and will
help the crime detection field in many ways that is from
arresting the criminals to reducing the crimes by carrying
out various necessary measures. The project is helpful for
general public in getting information about the crime
status of the area and get a safe path to a desired
destination.
REFERENCES
[1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis
using k-means clustering, International Journal of
Computer Applications, Vol. 83 – No4, December 2013.
[2] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, Jim Gray, Series Editor Morgan Kaufmann
Publishers, August 2000.
[3] P. Berkhin, ―Survey ofclusteringdataminingtechniques,
In: Accrue Software, 2003.
[4] W. Li, ―Modified k-means clustering algorithm, IEEE
Congress on Image and Signal Processing, pp. 616- 621,
2006.
[5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al-
Jabbouli, Data clustering using the Bees algorithm,
proceedings of 40th CRIP International Manufacturing
Systems Seminar, 2006.
[6] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, 2nd Edition, Morgan Kaufmann Publisher,
2001.

More Related Content

What's hot

IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET Journal
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
IRJET Journal
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPK
Ashir Iqbal
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
IRJET Journal
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
IRJET Journal
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
IRJET Journal
 
Referendum Using Android Application
Referendum Using Android ApplicationReferendum Using Android Application
Referendum Using Android Application
Associate Professor in VSB Coimbatore
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
eSAT Publishing House
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET Journal
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
akshay hebbar
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET Journal
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
 

What's hot (20)

IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPK
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Referendum Using Android Application
Referendum Using Android ApplicationReferendum Using Android Application
Referendum Using Android Application
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 

Similar to IRJET - Reporting and Management System for Online Crime

IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
VinothkumaR Ramu
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
Kusum Sankhala
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
 
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIntrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
IJCSEA Journal
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
Ertugrul Akbas
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
Ertugrul Akbas
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream Computing
IRJET Journal
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET Journal
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 

Similar to IRJET - Reporting and Management System for Online Crime (20)

IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
Online Crime Reporting System
Online Crime Reporting SystemOnline Crime Reporting System
Online Crime Reporting System
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIntrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream Computing
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

IRJET - Reporting and Management System for Online Crime

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2084 Reporting and Management System for Online Crime Manjula M1, Manoj Kumar P S2 1Assistant Professor, Atria Institute of Technology, Visvesvaraya Technological University, Bangalore 2Student, Atria Institute of Technology, Visvesvaraya Technological University, Bangalore ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The aim of this project is to develop an online managing crime report system which is accessible to the common public and the police department easily. The system provides users with the information about the crime rates of a desired area. This is useful for tourists who are entering in an unvisited area. If the user enters in 100 meter radius of a high alert area then he/she will be notified with an alert message. The user gets notified about the different crime rates in the area and can provide the safest path to the desired destination. Also, the system registers the complaints from the people through online web application where they can upload images and videos of the crime and it will be helpful for the police department in catching criminals. The person can give complaint at any time. Key Words: KNN Algorithm, AES Algorithm, K-Means Algorithm. 1. INTRODUCTION Crime is a part of illegal activities in human life. The rise of population and complex society rises the range of anti- social conducts that must be restricted by the government through the military and different organizations particularly the Police Force. There are many current crime management systems which faces several difficulties, as there is no means to report crime instantly other than phone calls, messaging or face-to-face compliant filing. Hence, we have proposed an online crime reporting system which allows the user to file complaints or missing reports and keep a track of it. There are 3 categories that a usercan file; Complaint,CrimeReport and Missing Report and can see all the status of what action has been taken by the admin. To file any of the above 3 complaints, the user should register in to the system and provide his right credentials to file them. The crime reporting system project also allows other users who doesn’t want to register but can check the crimes happening at his/her or any other area, has to just provide the pin code and in return the system displays the list of crimes if any filed. The offline i.e. the unregistered user can also take advantage of checking the missing person details, but he/she is refrained from getting complaints done by the users. The Front End of the crime reporting system is done using Android Studio and SQL serves as a backend to store books lists and inventory data. The system, has both the user as well the Admin Part, the role of admin is to just check all the 3 modules or categories and update their status likewise. This system helps the users in tracking any report filed to the law and take an advantage of reporting any complaint from anywhere bringing the whole system online. 1.1 Literature Survey 1. Sunil Yadav illustrate that how social development may lead to crime prevention so that to increase the predictive accuracy supervised, semi-supervised and unsupervised learning technique are used and also k-means is used to create number of clusters. 2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi have analysed, the main objective of this paper is to classify clustered crimes based on occurrence frequency during different years. Data mining is used extensively in terms of analysis, investigation and discovery of patterns for occurrenceofdifferent crimes. 3. Shyam Varan Nath have used the clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k- means clustering with some enhancements to aid in the process of identification of crime patterns. 2. Project Overview The crime rates accelerate continuously and the crime patterns are constantly changing. According to National Crime Records Bureau, crime against women has significantly increased in recent years. It has become the most prior to the administration to enforce law and order to reduce this increasing rate of the crime against women. We illustrates how social development may lead to crime prevention. So we are developing the system which can used to detect and predict the crimes for the area where the person or user currently stand. Crime
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2085 detection and analysis will be to generate the crime hot- spots that will help in deployment of police at mostly likely places of crime for any window of time, to allow most effective utilization of police resources. The developed model will reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. We add the woman safety module for security. When women press the power button of android mobile 3 to 4 times then help message send to relatives or police. Due to this we reduce crime in the society and in country. Here we use module of crime capture means user can capture the photo of crime send topolice. There is user or actors which are as follows, 1. Userhastheaccountandforaccessingthathe/she must be provide the correct username andpassword. 2.Alluse-cases for thes of twareare presented. Description of all main Use cases use case template is to be provided. 3. A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals (represented as use cases), and any dependencies between those use cases. The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted. [A]AES Encryption Process AES is an iterative rather than Feistel cipher. It is based on substitution permutation network. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around(permutations). Interestingly, AES performs all its computations on bytes rather than bits. These 16 bytes are arranged in four columns and four rows for processing as a matrix. Unlike DES, the number of rounds in AES is variable and depends on the length of the key. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. In present day cryptography, AES is widely adopted and supported in both hardware and software. Till date, no practical cryptanalytic attacks against AES have been discovered. Additionally, AES has built-in flexibility of key length, which allows a degree of future- proofing against progress in the ability to perform exhaustive key searches. However, just as for DES, the AES security is assured only if it is correctly implemented and good key management is employed. The encryption process uses a set of specially derived keys called round keys. These reapplied, along with other operations, on an array of data that holds exactly oneblock ofdata? The data tobeencrypted.Thisarray we call the statearray. You take the following AES steps of encryption for128-bit block: • Derive the set of round keys from the cipherkey. • Initialize the state array with the block data (plaintext). • Add the initial round keyto the starting state array. • Perform nine rounds of state manipulation. Fig-1: AES Algorithm The reason that the rounds have been listed as “nine followed by a final tenth round” is because the tenth round involves a slightly different manipulation from the others. Theblock tobeencryptedisjusta sequence of 128 bits. AES works with byte quantities so we first convert the 128 bits into 16 bytes. We say “convert,” but, in reality, it is almost certainly stored this way already. Operations in RSN/AES are performed on a two- dimensional byte array of four rows and four columns. At the start of the encryption, the 16 bytes of data, numbered D0? D15, are loaded into the array as shown
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2086 in following Table A. Each round of the encryption process requires a series of steps to alter the state array. These stepsinvolve four types of operations called: 1. SubBytes 2. ShiftRows 3. MixColum ns [B]Data Mining Data mining is a new technology, which helps organizations to process data through algorithms to uncover meaningful patterns and correlations from large databases that otherwise may not be possible with standard analysis and reporting. Data mining tools can helps to understand the business better and also improve future performance through predictive analysis and make them proactive and allow knowledge driven decisions. Issues related to information extraction fro large databases, data mining field brings together methods from several domains like Machine Learning, Statistics, Pattern Recognition, Databases and Visualizations. Data Mining fields find its application in market analysis and, management like for example customer relationship, management, cross selling, market segmentation. It can also be used in risk analysis and management for forecasting, customer retention, improved underwriting, quality control, competitive analysis and credit scoring. [C]System Architecture Fig:2 System Architecture [D]Feasibility Analysis Np-hard Np-Complete: • What is P? P is set of all decision problems which can be solved in polynomial time by a deterministic. Since it can be solved in polynomial time, it can be verified in polynomial time. Therefore P is a subset of NP. P: Crime is a matter of major concern to society, it must be checked. Although crime, being an integral part of civilization, it can definitely be kept within limits. The task of maintaining peace and order is delegated internally to the police. What is NP? “NP” means “we can solve it in polynomial time if we can break the normal rules of step-by-step computing”. What is NP Hard? A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-problem (nondeterministic polynomial time) problem. NP-hard therefore means” at least as hard as any NP-problem,” although it might, in fact, be harder. NP-Hard: It would be very difficult to only go through the manual process of crime reporting to police portal. So here in this case the P problem is NP hard. i.e. P=NP-Hard
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2087 What is NP-Complete?  Since this amazing”N” computer can also do anything a normal computer can, we know that”P” problems are also in”NP”.  So, the easy problems are in”P” (and”NP”), but the really hard ones are *only* in”NP”, and they are called”NP-complete”.  It is like saying there are things that People can do (”P”), there are things that Super People can do (”SP”), and there are things *only* Super Peoplecan do (”SP-complete”). NP-Complete: Crime detection and analysis will be to generate the crime hot- spots that will help in deployment of police at most likely places of crime for any given window of time, to allow most effective utilization of police resources. [E]K – Nearest Neighbor NP Analysis K–Nearest Neighbor algorithm is a Machine Learning Classification Technique. It is used to classify a given element into one of the classes which is closest to the element. Consider a data set of ‘n’ samples and ‘d’ dimensions. There is a point of interest whose class we want to determine on a two-dimensional plot. We calculate the distance between the point of interest to all other points in the data set.. If the data set is small with less number of dimensions, this algorithm runs in a reasonable amount of time. Since the time complexity of K–Nearest Neighbor algorithm using Brute Force Approach is the algorithm runs in polynomial time and hence fall under P class of Problems. 3. CONCLUSION The developed model will help reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. The project is helpful for general public in getting information about the crime status of the area and get a safe path to a desired destination. REFERENCES [1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis using k-means clustering, International Journal of Computer Applications, Vol. 83 – No4, December 2013. [2] J. Han, and M. Kamber, ―Data mining: concepts and techniques, Jim Gray, Series Editor Morgan Kaufmann Publishers, August 2000. [3] P. Berkhin, ―Survey ofclusteringdataminingtechniques, In: Accrue Software, 2003. [4] W. Li, ―Modified k-means clustering algorithm, IEEE Congress on Image and Signal Processing, pp. 616- 621, 2006. [5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al- Jabbouli, Data clustering using the Bees algorithm, proceedings of 40th CRIP International Manufacturing Systems Seminar, 2006. [6] J. Han, and M. Kamber, ―Data mining: concepts and techniques, 2nd Edition, Morgan Kaufmann Publisher, 2001.