SlideShare a Scribd company logo
“ Add your company slogan ”

Using Data Mining
Techniques to Analyze Crime
Pattern
Presented by:
Dr.Zakaria Suliman Zubi
Associate Professor
Computer Science Department
Faculty of Science
Sirte University
Sirte, Libya

LOGO
Contents
 Abstract.








Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Abstract
 Law enforcement agencies represented in the police today faced a
large volume of data every day. These data can be processed and
transformed into useful information. In this since, Data mining can
be applied to greatly improve crime analysis. Which can help to
reduce and preventing crime as much as possible.
 Crime reports and data are used as an input for the formulation of
the crime prevention policies and strategic plans.
 This work will apply some data mining methods to analyses Libyan
national criminal record data to help the Libyan government to make
a strategically decision regarding prevention the increasing of the
high crime rate these days.
 The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).
 Our proposed model will be able to extract crime patterns by using
association rule mining and clustering to classify crime records on
the basis of the values of crime attributes.

www.themegallery.com
Contents
 Abstract.
 Introduction.







Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.
www.themegallery.com
Introduction
 Data Mining or Knowledge Discovery in Databases (KDD) in simple
words is nontrivial extraction of implicit, previously unknown, and
potentially useful information from data.


KDD is the process of identifying a valid, potentially, useful and
ultimately understandable structure in data..

 Crime analyzes is an emerging field in law enforcement without
standard definitions. This makes it difficult to determine the crime
analyzes focus for agencies that are new to the field.
 Crime analysis is act of analyzing crime. More specifically, crime
analysis is the breaking up of acts committed in violation of laws into
their parts to find out their nature and reporting, some analysis.
 The role of the crime analysts varies from agency to agency.
Statement of these findings, The objective of most crime analysis is
to find meaningful information in vast amounts of data and
disseminate this information to officers and investigators in the field
to assist in their efforts to apprehend criminals and suppress
criminal activity.
www.themegallery.com
Contents




Abstract.
Introduction.
Data Mining Models.







Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Data Mining Models
 The Data Mining models are categorized into different leaves. Further,
each leaf signifies the relationship, if any, that is highlighted from the
database. the Data Mining Models can be put into one of the six main
categories: 1) Association, 2) Classification, 3) Clustering, 4)
Prediction, 5) Sequence Discovery, and 6) Generalization

www.themegallery.com
data Mining Models Cont…
 Table 2 classifies the various Data Mining algorithms
according to problem type, namely, Association,
Classification, Clustering, Prediction, Discovery, and
Summarization.

www.themegallery.com
Data Mining models Cont…


Cont….

www.themegallery.com
Contents





Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?






Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Why Analyze Crime?
Crime Analysts usually tend to justify their existence as crime analysts in what is
known as law enforcement agency. it makes sense to analyze crime. Some good
reasons are listed as follow:
1. Analyze crime to inform law enforcers about general and specific crime
trends, patterns, and series in an ongoing, timely manner.
2. Analyze crime to take advantage of the abundance of information existing in
law enforcement agencies, the criminal justice system, and public domain.
3. Analyze crime to maximize the use of limited law enforcement resources.
4. Analyze crime to have an objective means to access crime problems locally,
regionally, nationally within and between law enforcement agencies.
5. Analyze crime to be proactive in detecting and preventing crime.
6. Analyze crime to meet the law enforcement needs of a changing society.

www.themegallery.com
Why Analyze Crime? Cont…
 In general there are four different techniques for
analyzing crimes, as follow:
1.
2.
3.
4.

Linkage Analysis
Statistical Analysis
Profiling
Spatial Analysis

 Each of the above techniques has its own advantages
and drawbacks and can be used in specific cases.

www.themegallery.com
Contents






Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.





Data Set.
The MLCR Proposed Model.
Conclusion.
www.themegallery.com
Data Mining Task
A. Data collection.
The dataset that was used as training and testing data
set were extracted from the Supreme Security
Committee in Tripoli, Benghazi and Al-Jafara.
These data contain data about both Crimes and
Criminals with the following main attributes:
1. Crime ID: Individual crimes are designated by unique crime id.
2. Crime type: indicates crime type.
3. Date: Indicate when a crime happened.
4. Gender: Male or Female.
5. Age: age of individual Criminal.
6. Crime Address: location of the crime.
7. Marital status: status of the Criminal.
www.themegallery.com
Data Mining Task Cont…
B. Data Preprocessing .
 Real world usually have the following drawbacks:
Incompleteness, Noisy, and Inconsistence. So these data need to
be preprocessed to get the data suitable for analysis purpose. The
preprocessing includes the following tasks as it shown in
1.
2.
3.
4.
5.

Data cleaning.
Data integration
Data transformation.
Data reduction.
Data discretization

Figure (2) shows the distribution of
offenses versus different crime and
criminal attributes.
Figure (2): attributes for crime and criminal
www.themegallery.com
Contents







Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.

 The MLCR Proposed Model.
 Conclusion.
www.themegallery.com
Data Set
We will consider crime database as a training dataset used in
our model. The mentioned database contains a real data values
from crime and criminal attributes. We will also consider 70
percent as training value of the proposed model and 30 percent
for testing. The following table shows the data we used in our
model.

www.themegallery.com








Contents

Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.

 Conclusion.
www.themegallery.com
The MLCR proposed model
The Mining Libyan Criminal Record (MLCR) proposed
model will be implemented to conduct and interact with two
types of mining algorithms to overcome with two different
types of results effectively. Those two approaches are
considered as a sub-prototypes of the proposed MLCR
model. Those prototypes will be illustrated as follows:
A.Mining Libyan Criminal Record-using Association rules
(MLCR-AR).

B.Mining Libyan Criminal Record-using Clustering (MLCR-C).

www.themegallery.com
The MLCR proposed model Cont…
A. Mining Libyan Criminal Record-using
Association rules (MLCR-AR).


Association rule mining is a method used to generate rules from crime
dataset based on frequents occurrence of patterns to help the decision
makers of our security society to make a prevention action.

 One of the most popular algorithm are called Apriori and FP-growth
Association rule mining classically intends at discovering association
between items in a transactional database.
 The Apriori algorithm called also as “Sequential Algorithm” developed
by [Agrawal1994]. Is a great accomplishment in the history of mining
association rules[Cheung1996c]. It is also the most well known
association rules algorithm. This technique uses to perform association
analyze on the attributes of crimes.

www.themegallery.com
The MLCR proposed model Cont…
B. Mining Libyan Criminal Record-using Clustering (MLCR-C).


This prototype will use the same dataset indicated in MLCR_AR prototype. But
with Clustering Analysis.



Clustering is the technique that is used to group objects (crime and criminals)
without having predefined specification for their attributes.



Clustering is unsupervised classification: no predefined classes. Simple K-means
clustering algorithm is used in this work.
K-mean algorithm clusters the data members groups were m is predefined. InputCrime type. Number of clusters, Number of Iteration Initial seeds might produce
an important role in the final results.
Step1: Randomly choose cluster centers.
Step2: Assign instance to cluster based on their Distance to the cluster centers.
Step3: Centers of clusters are adjusted.
Step4: go to Step1 until convergence.
Step5: output X0 ,X1,X2 ,X3.
Fig3: criminal age vs. crime type After applying K-means algorithm
www.themegallery.com









Contents

Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Conclusion



Clustering and association rules were defined as a data mining techniques to
automatically retrieve, extract and evaluate information for knowledge
discovery from crime data.




This information was collected from many police departments in Libya.

Association rules Mining is one of the data mining techniques for data to be
used to identify the relationship and to generate rules from crime dataset based
on frequents occurrence of patterns to help the decision makers of our security
society to make a prevention action.




Clustering is one of the data mining techniques also used to group objects
(crime and criminals) without having predefined specification for their
attributes.
The algorithms such as K-means algorithm and Aproir algorithm are used in
this paper.



Those algorithms were expressed in details and a comparative study were
denoted in this paper.


A promising results were shown in the following figure.
www.themegallery.com
Thank you !!!
Using Data Mining Techniques to Analyze Crime Pattern

More Related Content

What's hot

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
Hi Tech Criminal Justice
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Sunil Jagani
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
Anavadya Shibu
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
Benjamin Ang
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
KrupaliDobariya
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
Aashri Tandon
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
Stuti Deshpande
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
Deborah Osborne
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
Shubham Dubey
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Colin Bartram
 
Mining data streams
Mining data streamsMining data streams
Mining data streams
Akash Gupta
 
similarity measure
similarity measure similarity measure
similarity measure
ZHAO Sam
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scale
Impetus Technologies
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
Makrand Patil
 

What's hot (20)

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Mining data streams
Mining data streamsMining data streams
Mining data streams
 
similarity measure
similarity measure similarity measure
similarity measure
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scale
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 

Viewers also liked

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
Yawen Li
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
jangyoung
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia Tech
Jonathan D'Cruz
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Data mining
Data miningData mining
Data mining
Akannsha Totewar
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
Zakaria Zubi
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
Zakaria Zubi
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
Zakaria Zubi
 
Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015
eVisions Advertising s.r.o.
 
Random Forest and KNN is fun
Random Forest and KNN is funRandom Forest and KNN is fun
Random Forest and KNN is fun
Zhen Li
 
San Francisco Crime Classification
San Francisco Crime ClassificationSan Francisco Crime Classification
San Francisco Crime Classification
sai praneeth reddy
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programs
santosh kumar
 
Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping
IJORCS
 
Text Mining, Association Rules and Decision Tree Learning
Text Mining, Association Rules and Decision Tree LearningText Mining, Association Rules and Decision Tree Learning
Text Mining, Association Rules and Decision Tree LearningAdrian Cuyugan
 

Viewers also liked (19)

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia Tech
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Apriori Algorithm
 
Data mining
Data miningData mining
Data mining
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
Edi text
Edi textEdi text
Edi text
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015
 
Random Forest and KNN is fun
Random Forest and KNN is funRandom Forest and KNN is fun
Random Forest and KNN is fun
 
San Francisco Crime Classification
San Francisco Crime ClassificationSan Francisco Crime Classification
San Francisco Crime Classification
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programs
 
Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping
 
Medical data mining
Medical data miningMedical data mining
Medical data mining
 
Text Mining, Association Rules and Decision Tree Learning
Text Mining, Association Rules and Decision Tree LearningText Mining, Association Rules and Decision Tree Learning
Text Mining, Association Rules and Decision Tree Learning
 

Similar to Using Data Mining Techniques to Analyze Crime Pattern

SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
ijaia
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
gerogepatton
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
ParthBhadani3
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms to
mlaij
 
Crime
CrimeCrime
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
IJSRD
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
Sarita30844
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
Fahad Almassoud
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
IRJET Journal
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
Daniel John
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago
Swati Arora
 

Similar to Using Data Mining Techniques to Analyze Crime Pattern (20)

SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms to
 
Clickstream ppt copy
Clickstream ppt   copyClickstream ppt   copy
Clickstream ppt copy
 
Crime
CrimeCrime
Crime
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and PredictionCrime analysis and Prediction Crime analysis and Prediction
Crime analysis and Prediction Crime analysis and Prediction
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago
 

More from Zakaria Zubi

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
Zakaria Zubi
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Zakaria Zubi
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understandingZakaria Zubi
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesZakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 

More from Zakaria Zubi (8)

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understanding
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Using Data Mining Techniques to Analyze Crime Pattern

  • 1. “ Add your company slogan ” Using Data Mining Techniques to Analyze Crime Pattern Presented by: Dr.Zakaria Suliman Zubi Associate Professor Computer Science Department Faculty of Science Sirte University Sirte, Libya LOGO
  • 2. Contents  Abstract.        Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 3. Abstract  Law enforcement agencies represented in the police today faced a large volume of data every day. These data can be processed and transformed into useful information. In this since, Data mining can be applied to greatly improve crime analysis. Which can help to reduce and preventing crime as much as possible.  Crime reports and data are used as an input for the formulation of the crime prevention policies and strategic plans.  This work will apply some data mining methods to analyses Libyan national criminal record data to help the Libyan government to make a strategically decision regarding prevention the increasing of the high crime rate these days.  The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).  Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes. www.themegallery.com
  • 4. Contents  Abstract.  Introduction.       Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 5. Introduction  Data Mining or Knowledge Discovery in Databases (KDD) in simple words is nontrivial extraction of implicit, previously unknown, and potentially useful information from data.  KDD is the process of identifying a valid, potentially, useful and ultimately understandable structure in data..  Crime analyzes is an emerging field in law enforcement without standard definitions. This makes it difficult to determine the crime analyzes focus for agencies that are new to the field.  Crime analysis is act of analyzing crime. More specifically, crime analysis is the breaking up of acts committed in violation of laws into their parts to find out their nature and reporting, some analysis.  The role of the crime analysts varies from agency to agency. Statement of these findings, The objective of most crime analysis is to find meaningful information in vast amounts of data and disseminate this information to officers and investigators in the field to assist in their efforts to apprehend criminals and suppress criminal activity. www.themegallery.com
  • 6. Contents    Abstract. Introduction. Data Mining Models.      Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 7. Data Mining Models  The Data Mining models are categorized into different leaves. Further, each leaf signifies the relationship, if any, that is highlighted from the database. the Data Mining Models can be put into one of the six main categories: 1) Association, 2) Classification, 3) Clustering, 4) Prediction, 5) Sequence Discovery, and 6) Generalization www.themegallery.com
  • 8. data Mining Models Cont…  Table 2 classifies the various Data Mining algorithms according to problem type, namely, Association, Classification, Clustering, Prediction, Discovery, and Summarization. www.themegallery.com
  • 9. Data Mining models Cont…  Cont…. www.themegallery.com
  • 10. Contents     Abstract. Introduction. Data Mining Models. Why Analyze Crime?     Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 11. Why Analyze Crime? Crime Analysts usually tend to justify their existence as crime analysts in what is known as law enforcement agency. it makes sense to analyze crime. Some good reasons are listed as follow: 1. Analyze crime to inform law enforcers about general and specific crime trends, patterns, and series in an ongoing, timely manner. 2. Analyze crime to take advantage of the abundance of information existing in law enforcement agencies, the criminal justice system, and public domain. 3. Analyze crime to maximize the use of limited law enforcement resources. 4. Analyze crime to have an objective means to access crime problems locally, regionally, nationally within and between law enforcement agencies. 5. Analyze crime to be proactive in detecting and preventing crime. 6. Analyze crime to meet the law enforcement needs of a changing society. www.themegallery.com
  • 12. Why Analyze Crime? Cont…  In general there are four different techniques for analyzing crimes, as follow: 1. 2. 3. 4. Linkage Analysis Statistical Analysis Profiling Spatial Analysis  Each of the above techniques has its own advantages and drawbacks and can be used in specific cases. www.themegallery.com
  • 13. Contents      Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task.    Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 14. Data Mining Task A. Data collection. The dataset that was used as training and testing data set were extracted from the Supreme Security Committee in Tripoli, Benghazi and Al-Jafara. These data contain data about both Crimes and Criminals with the following main attributes: 1. Crime ID: Individual crimes are designated by unique crime id. 2. Crime type: indicates crime type. 3. Date: Indicate when a crime happened. 4. Gender: Male or Female. 5. Age: age of individual Criminal. 6. Crime Address: location of the crime. 7. Marital status: status of the Criminal. www.themegallery.com
  • 15. Data Mining Task Cont… B. Data Preprocessing .  Real world usually have the following drawbacks: Incompleteness, Noisy, and Inconsistence. So these data need to be preprocessed to get the data suitable for analysis purpose. The preprocessing includes the following tasks as it shown in 1. 2. 3. 4. 5. Data cleaning. Data integration Data transformation. Data reduction. Data discretization Figure (2) shows the distribution of offenses versus different crime and criminal attributes. Figure (2): attributes for crime and criminal www.themegallery.com
  • 16. Contents       Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set.  The MLCR Proposed Model.  Conclusion. www.themegallery.com
  • 17. Data Set We will consider crime database as a training dataset used in our model. The mentioned database contains a real data values from crime and criminal attributes. We will also consider 70 percent as training value of the proposed model and 30 percent for testing. The following table shows the data we used in our model. www.themegallery.com
  • 18.        Contents Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model.  Conclusion. www.themegallery.com
  • 19. The MLCR proposed model The Mining Libyan Criminal Record (MLCR) proposed model will be implemented to conduct and interact with two types of mining algorithms to overcome with two different types of results effectively. Those two approaches are considered as a sub-prototypes of the proposed MLCR model. Those prototypes will be illustrated as follows: A.Mining Libyan Criminal Record-using Association rules (MLCR-AR). B.Mining Libyan Criminal Record-using Clustering (MLCR-C). www.themegallery.com
  • 20. The MLCR proposed model Cont… A. Mining Libyan Criminal Record-using Association rules (MLCR-AR).  Association rule mining is a method used to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action.  One of the most popular algorithm are called Apriori and FP-growth Association rule mining classically intends at discovering association between items in a transactional database.  The Apriori algorithm called also as “Sequential Algorithm” developed by [Agrawal1994]. Is a great accomplishment in the history of mining association rules[Cheung1996c]. It is also the most well known association rules algorithm. This technique uses to perform association analyze on the attributes of crimes. www.themegallery.com
  • 21. The MLCR proposed model Cont… B. Mining Libyan Criminal Record-using Clustering (MLCR-C).  This prototype will use the same dataset indicated in MLCR_AR prototype. But with Clustering Analysis.  Clustering is the technique that is used to group objects (crime and criminals) without having predefined specification for their attributes.  Clustering is unsupervised classification: no predefined classes. Simple K-means clustering algorithm is used in this work. K-mean algorithm clusters the data members groups were m is predefined. InputCrime type. Number of clusters, Number of Iteration Initial seeds might produce an important role in the final results. Step1: Randomly choose cluster centers. Step2: Assign instance to cluster based on their Distance to the cluster centers. Step3: Centers of clusters are adjusted. Step4: go to Step1 until convergence. Step5: output X0 ,X1,X2 ,X3. Fig3: criminal age vs. crime type After applying K-means algorithm www.themegallery.com
  • 22.         Contents Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 23. Conclusion  Clustering and association rules were defined as a data mining techniques to automatically retrieve, extract and evaluate information for knowledge discovery from crime data.   This information was collected from many police departments in Libya. Association rules Mining is one of the data mining techniques for data to be used to identify the relationship and to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action.   Clustering is one of the data mining techniques also used to group objects (crime and criminals) without having predefined specification for their attributes. The algorithms such as K-means algorithm and Aproir algorithm are used in this paper.  Those algorithms were expressed in details and a comparative study were denoted in this paper.  A promising results were shown in the following figure. www.themegallery.com