SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Crime Forecasting System
                                                  (An exploratory web-based approach)

                                                          1-Yaseen Ahmed MEENAI
                                                   Institute of Business administration (IBA)
                                                       Karachi, Sindh, Zip Code, Pakistan

                              2-Twaha Ahmed MEENAI, 3-Arafat TEHSIN, 4-Muhammad Ali ILYAS
                                 Department of Computer Science and Engineering, Bahria University
                                                Karachi, Sindh, Zip Code, Pakistan

                              ABSTRACT                                          Clearly depicts the comprehensive picture of criminal activities
                                                                                 in a city
With the continuous rise in crimes in some big cities of the world like
                                                                            With these features the most valuable prospective outcomes of the
Karachi and the increasing complexity of these crimes, the difficulties
                                                                            system are considerable reduction in the crime rate, maintenance of a
the law enforcing agencies are facing in tracking down and taking out
                                                                            standardized and centralized crime database and satisfactory response
culprits have increased manifold. To help cut back the crime rate, a
                                                                            time by the law enforcement agencies.
Crime Forecasting System (CFS) can be used which uses historical
information maintained by the local Police to help them predict crime
patterns with the support of a huge and self-updating database. This                               2.   BACKGROUND
system operates to prevent crime, helps in apprehending criminals, and      Keeping the focus bounded to a crime prone mega city like Karachi,
to reduce disorder. This system is also vital in helping the law            the study through field survey and the analysis of the current
enforcers in forming a proactive approach by helping them in                conventional approach/practice for handling and managing crimes
identifying early warning signs, take timely and necessary actions, and     reveal a series of flaws. Some of which are stated below.
eventually help stop crime before it actually happens. It will also be                Lack of data sharing
beneficial in maintaining an up to date database of criminal suspects            Problem-solving clearly depends on the availability of robust
includes information on arrest records, communication with police                data (Read and Tilly, 2000, p. 28) but the manual system
department, associations with other known suspects, and membership               currently in use makes the communication channel and
in gangs/activist groups. After exploratory analysis of the online data          information flow very static and rigid.
acquired from the victims of these crimes, a broad picture of the                     Inefficient Resource Allocation
scenario can be analyzed. The degree of vulnerability of an area at              According to Boba (2001) Crime Analysts can assist in effective
some particular moment can be highlighted by different colors aided              allocation of resources by determining the times and areas i.e.
by Google Maps. Some statistical diagrams have also been                         when and where the offenses are likely to occur. The system
incorporated. The future of CFS can be seen as an information engine             under study shows that due to the absence of appropriate data
for the analysis, study and prediction of crimes.                                processing mechanism the practice of efficient resource
                                                                                 allocation is not in place.
Keywords: crime, exploratory analysis, graphs.                                        Inconsistent standards of data storage
                                                                                 The data storage standards are not consistent as different
                         1.    INTRODUCTION                                      departments use customized formats, schema and parameters.
                                                                                      Slow Response Time
The aim of this paper is to propose the development of a Crime                   The delay, due to the absence of a rapid reporting mechanism,
Forecasting System to support the police operations in Karachi. The              non preemptive approach and the fulfillment of departmental
proposed system will be able to collect and store crime incidents and            protocols at law enforcement agencies produces a mandatory
analyze it using different tools to process crimes’ data. This would             flaw of a slow response.
help the Law Enforcement Agencies in forecasting crime and                  With the above mentioned flaws of the system the crime rate is likely
preventing it before it actually occurs. Thus, leads to a reduction in      to increase naturally. Despite several governmental efforts and
the crime rate. The system would also benefit the general public by         restructuring of the law enforcement agencies/departments, the
providing the victims an unconventional and advanced medium to              history asserts this trend too.
report the criminal incidents they are subjected to.                        In order to address these problems the need of a crime forecasting
                                                                            system arises. The initial research was based on the consideration of
The features of the system if highlighted, takes the form as follows. It;   multiple factors specially the Crime Index. This approach employed
                                                                            the use of statistical methods namely Regression, Time Series
    Comes out as a decision support system that assists the law
                                                                            Analysis, Double Exponential Smoothing. Crime Index, which is the
     enforcement agencies in optimal utilization of resources
                                                                            rate of crime over population, was the main input parameter provided
    Is able to predict crime patterns by analyzing the graphs based on
                                                                            to these statistical methods, on the basis of which it forecasted
     real time data sets.
                                                                            results.
    Shows the results in multiple views using Google Maps with
     various perspectives.                                                  The forecasting process comprised of three steps:
    Provides ease in use with user friendly interfaces due to which no          1. Evaluation of Crime Index.
     special training would be required.                                         2. Gathering data.
    Improves the quality of results/output with grown data sets over            3. Application of the techniques on the gathered data.
     the passage of time.                                                   However the drawback associated with this approach was that it did
    Highlights Gang based criminal activities located within               not cater for all the effecting factors, thus less effective and the
     different parts of the city thus expose criminal social networks.      intended scope was not fully covered. For instance, if one considers
    Provides information regarding criminal Characteristics such as        the murder crime, it can be seen as only murder while it may be a
     their facial appearance, dressing style, nature of weapons used        result of an initial crime. i.e. the reasons and causes behind may
     for crime.
possibly be categorized as crimes too, thus affecting the results of                                3. Extract important variables.
forecasting.                                                                                        4. Detect outliers and anomalies.
The literature survey that was conducted in order to understand and                                 5. Test underlying assumptions.
identify the features that we need to incorporate into the system, as                               6. Develop parsimonious models.
well as to learn the various approaches that others have taken to                                   7. Determine optimal factor settings.
improve this system. The following table- 2.1 contains summary                                  The disadvantages of using this technique were,
features that depicts how have the different systems been                                               It does not provide definitive decisions always.
implemented in terms of the features they provide (details of these                                     Requires a high degree of judgment
systems can be obtained from the first author).
                                                                                                Since the system relies heavily on crime data, one of the vital tasks




                                                                                Detective [2]
                                                    WebCAT[1]


                                                                CADmine[5
                        CrimeView


                                          ATAC[4]
                                                                                                was to collect it. Initially the law enforcement agencies were




                                                                                   Data
       Features                                                                                 contacted for this purpose but the effort was not productive.




                                                                            ]
                                    [3]




                                                                                                Therefore the data was acquired through Interviews, Questionnaire,
                                                                                                Observations and Research. These techniques ensure first hand real
                                                                                                data with magnified volume and minimum error. Generally most of
          Statistical                                                                           the cases are not reported due to the problems people have to face in
             Model                                                                 ×            reporting them to the law enforcement agencies. This Web based
                                                                                                approach works as a remedy to this problem.
             Spatial
            Analysis        ×                                                      ×            3.2 Architecture

         Data Entry         ×                       ×                ×             ×            The underlying database design which serves data storage and
                                                                                                retrieval. Its design is fully optimized and synchronized with the
                                                                                                questionnaire and has the flexibility for future enhancements and
                                                                                Detective [2]
                                                    WebCAT[1]


                                                                CADmine[5




                                                                                                adjustments. New factors may be added according to the dynamic
                        CrimeView


                                          ATAC[4]




                                                                                   Data




                                                                                                crime patterns in order to improve the effectiveness of the system.
       Features
                                                                            ]
                                    [3]




                                                                                                The context diagram serves to focus attention on the system boundary
                                                                                                and helps in clarifying the precise scope of the system. Figure 3.1
        Calendaring         ×                       ×                ×             ×            .


          Reporting


       Data Mining

    Artificial Neural
           Networks         ×             ×         ×                ×
     Environmental
          Mapping

              Alerts                                ×                              ×
                        Table 2.1 (Benchmark)

                  3. METHODS and MATERIALS                                                                         Figure 3.1- the context diagram

3.1 The Techniques                                                                              3.3 Environmental Mapping

Exploratory Data Analysis lies at the core of Crime Forecasting                                 The geographical data assists in mapping with the help of Google
System. Exploratory data analysis (EDA) used to analyze data for                                APIs which act as a bridge between our system and Google Maps.
the purpose of formulating hypotheses worth testing. It was so named                            The process is explained in Figure 3.2
by John Tukey, Weiss (2002) . The objectives of EDA are to:

   Suggest hypotheses about the causes of observed phenomena
   Assess assumptions on which statistical inference will be based
   Support the selection of appropriate statistical tools and
     techniques
 Provide a basis for further data collection through surveys or
     experiments.
The approach under consideration employs a variety of techniques
(mostly graphical) to,
    1. Maximize insight into a data set.                                                                        Figure 3.2 – The Mapping Process
    2. Uncover underlying structure.
3.4 The dependency contours

Figure 3.3 shows the dependencies of different qualitative entities
which ensures the relationship among them. This vital result
authenticates the effectiveness, productivity and the workability of the
system. The contours and the color intensities confirm the relationship
between areas and crimes.




                                                                                                           Figure 4.1
                                                                           4.2 The Forecasting
                                                                           Once the data is seen there comes the awaited output of the system i.e.
                        Figure 3.3 - Contours                              forecasting. The forecast can be seen as per area with different factors
                                                                           and aspects. This provides a closely conclusive and demographic
3.5 Statistics                                                             picture to the local law enforcement agencies. For instance the
                                                                           parameters of behavior and age tell about what social category of
Figure 3.4 verifies the hypothesis made against the authenticity of data   people is to be focused to address the increase in crime in the
collected through this system as most of the crimes remain unreported      respective area.
due to the procedural hindrances. The analysis conducted on the
involvement of number of criminals assists in prediction of the nature
of crime expected as per gang based activities.




                                                                                                      4.    CONCLUSION
                                                                           A thorough study revealed that there are certain areas of criminology
                                                                           which are needed to be addressed using computational capabilities
                                                                           and techniques. Inferential engine and prediction on the basis of the
                                                                           implementation of statistical and AI techniques through computers
                                                                           have been found very beneficial if exploited for the purpose.
                             Figure 3.4                                    Following are the results after the implementation of our efforts
                       4. THE INTERFACES                                           Standardization of input in form of a questionnaire and
                                                                                    designing of a centralized database
4.1 Data Representation                                                            Analytical Engines
The following snapshot in figure shows the overall picture of criminal             Inferential Engines
activities per area. Moreover different colors represent different                 Map based visualization of crime affected areas
intensities of crimes. At a glance delivery of information increases the
visual value of the system. The interface reflects the changes in real                             5. FUTURE WORK
time as per updated data. Thus the most current picture of crimes per
area appears with shifts and trends. The interface is a result of high     To increase the usefulness of Crime Forecasting system, one of the
profile integration of the data and Google Maps which enhances the         enhancements that can be made is to develop the system as a mobile
effectiveness and value of the system manifold.                            application. This would allow the user to report the crime remotely as
                                                                           soon as he observes one and eliminate the need for a desktop system
                                                                           to report a crime. To increase the effectiveness of the Crime
Forecasting System, more techniques could be used for forecasting
crime. Techniques belonging to the Data Mining and Artificial
Intelligence field may be incorporated into the system to make the
forecasting process even more effective and efficient.

                  6. ACKNOWLEDGEMENTS

We would like to express our deepest gratitude to ALLAH the
ALMIGHTY, who bestowed upon us enough strength to make this
research possible. Secondly, we would like to thank Prof. Dr. Sayeed
Ghani (Associate Dean, FCS-IBA) who supported the first author
morally to pursue his research for the sake of improving social
grounds. Special thanks to Sayyedah Muneezah Hashim (Software
Engineer/Technical Writer, Assurety Consulting Inc. Alumni Bahria
University Karachi) who actually initiated this study of Crime
Forecasting System in Karachi, Pakistan and let us extend this study
with her kind permission.

                        7. REFERENCES

Boba, R. (2001), Introductory Guide to Crime Analysis and
Mapping, Report to the Office of Community Oriented Policing
Services Cooperative Agreement, US Department of Justice;
Washington DC, (pg. 9)
Read, T., and Tilly, N. (2000), Crime Reduction Research Series
Paper 6, Not Rocket Science? Home Office; London, (pg. 28-35)
Weiss A. Neil (2002), Introductory Statistics, 5th Edition, Addison
Wesley. (pg. 193)

ATAC | Automated Tactical Analysis of Crime
http://www.bairsoftware.com/atac.html
CADmine
http://www.coronasolutions.com/products/cadmine.shtml
CrimeView®
http://www.theomegagroup.com/police/crime_mapping_solutions.ht
ml
DataDetective
http://www.sentient.nl/?dden
WebCAT™ Crime Analysis System
http://www.daprosystems.com/DPSProducts/crimeanalysis.aspx

Contenu connexe

Tendances

Merseyside Crime Analysis
Merseyside Crime AnalysisMerseyside Crime Analysis
Merseyside Crime AnalysisParang Saraf
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET Journal
 
Artificial Intelligence Models for Crime Prediction in Urban Spaces
Artificial Intelligence Models for Crime Prediction in Urban SpacesArtificial Intelligence Models for Crime Prediction in Urban Spaces
Artificial Intelligence Models for Crime Prediction in Urban Spacesmlaij
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...Hoax classification and sentiment analysis of Indonesian news using Naive Bay...
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...TELKOMNIKA JOURNAL
 

Tendances (8)

Merseyside Crime Analysis
Merseyside Crime AnalysisMerseyside Crime Analysis
Merseyside Crime Analysis
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
 
sdReport
sdReportsdReport
sdReport
 
Artificial Intelligence Models for Crime Prediction in Urban Spaces
Artificial Intelligence Models for Crime Prediction in Urban SpacesArtificial Intelligence Models for Crime Prediction in Urban Spaces
Artificial Intelligence Models for Crime Prediction in Urban Spaces
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...Hoax classification and sentiment analysis of Indonesian news using Naive Bay...
Hoax classification and sentiment analysis of Indonesian news using Naive Bay...
 

En vedette

Siratcha Wongkom No.00 Class 1/13
Siratcha Wongkom No.00 Class 1/13Siratcha Wongkom No.00 Class 1/13
Siratcha Wongkom No.00 Class 1/13Siratcha Wongkom
 
Piwik Mobile Overview - October 2011
Piwik Mobile Overview - October 2011Piwik Mobile Overview - October 2011
Piwik Mobile Overview - October 2011piwik
 
What we got done in the last year in Piwik
What we got done in the last year in PiwikWhat we got done in the last year in Piwik
What we got done in the last year in Piwikpiwik
 
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.Rafal Brzeski
 
Zapomniane lub nieodkryte funkcje systemu TYPO3
Zapomniane lub nieodkryte funkcje systemu TYPO3Zapomniane lub nieodkryte funkcje systemu TYPO3
Zapomniane lub nieodkryte funkcje systemu TYPO3Rafal Brzeski
 
Piwik Analytics Platform
Piwik Analytics PlatformPiwik Analytics Platform
Piwik Analytics Platformpiwik
 

En vedette (9)

Siratcha Wongkom No.00 Class 1/13
Siratcha Wongkom No.00 Class 1/13Siratcha Wongkom No.00 Class 1/13
Siratcha Wongkom No.00 Class 1/13
 
Internet and web
Internet and webInternet and web
Internet and web
 
3.2 social_network
3.2 social_network3.2 social_network
3.2 social_network
 
Technology1
Technology1Technology1
Technology1
 
Piwik Mobile Overview - October 2011
Piwik Mobile Overview - October 2011Piwik Mobile Overview - October 2011
Piwik Mobile Overview - October 2011
 
What we got done in the last year in Piwik
What we got done in the last year in PiwikWhat we got done in the last year in Piwik
What we got done in the last year in Piwik
 
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.
Uporzadkuj swoj TypoScript. TYPO3camp Poland 2013.
 
Zapomniane lub nieodkryte funkcje systemu TYPO3
Zapomniane lub nieodkryte funkcje systemu TYPO3Zapomniane lub nieodkryte funkcje systemu TYPO3
Zapomniane lub nieodkryte funkcje systemu TYPO3
 
Piwik Analytics Platform
Piwik Analytics PlatformPiwik Analytics Platform
Piwik Analytics Platform
 

Similaire à Crime forecasting system for soic final

Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python CloudTechnologies
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...gerogepatton
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningAnavadya Shibu
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaErtugrul Akbas
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningErtugrul Akbas
 

Similaire à Crime forecasting system for soic final (20)

PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
U24149153
U24149153U24149153
U24149153
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
 

Dernier

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Crime forecasting system for soic final

  • 1. Crime Forecasting System (An exploratory web-based approach) 1-Yaseen Ahmed MEENAI Institute of Business administration (IBA) Karachi, Sindh, Zip Code, Pakistan 2-Twaha Ahmed MEENAI, 3-Arafat TEHSIN, 4-Muhammad Ali ILYAS Department of Computer Science and Engineering, Bahria University Karachi, Sindh, Zip Code, Pakistan ABSTRACT  Clearly depicts the comprehensive picture of criminal activities in a city With the continuous rise in crimes in some big cities of the world like With these features the most valuable prospective outcomes of the Karachi and the increasing complexity of these crimes, the difficulties system are considerable reduction in the crime rate, maintenance of a the law enforcing agencies are facing in tracking down and taking out standardized and centralized crime database and satisfactory response culprits have increased manifold. To help cut back the crime rate, a time by the law enforcement agencies. Crime Forecasting System (CFS) can be used which uses historical information maintained by the local Police to help them predict crime patterns with the support of a huge and self-updating database. This 2. BACKGROUND system operates to prevent crime, helps in apprehending criminals, and Keeping the focus bounded to a crime prone mega city like Karachi, to reduce disorder. This system is also vital in helping the law the study through field survey and the analysis of the current enforcers in forming a proactive approach by helping them in conventional approach/practice for handling and managing crimes identifying early warning signs, take timely and necessary actions, and reveal a series of flaws. Some of which are stated below. eventually help stop crime before it actually happens. It will also be  Lack of data sharing beneficial in maintaining an up to date database of criminal suspects Problem-solving clearly depends on the availability of robust includes information on arrest records, communication with police data (Read and Tilly, 2000, p. 28) but the manual system department, associations with other known suspects, and membership currently in use makes the communication channel and in gangs/activist groups. After exploratory analysis of the online data information flow very static and rigid. acquired from the victims of these crimes, a broad picture of the  Inefficient Resource Allocation scenario can be analyzed. The degree of vulnerability of an area at According to Boba (2001) Crime Analysts can assist in effective some particular moment can be highlighted by different colors aided allocation of resources by determining the times and areas i.e. by Google Maps. Some statistical diagrams have also been when and where the offenses are likely to occur. The system incorporated. The future of CFS can be seen as an information engine under study shows that due to the absence of appropriate data for the analysis, study and prediction of crimes. processing mechanism the practice of efficient resource allocation is not in place. Keywords: crime, exploratory analysis, graphs.  Inconsistent standards of data storage The data storage standards are not consistent as different 1. INTRODUCTION departments use customized formats, schema and parameters.  Slow Response Time The aim of this paper is to propose the development of a Crime The delay, due to the absence of a rapid reporting mechanism, Forecasting System to support the police operations in Karachi. The non preemptive approach and the fulfillment of departmental proposed system will be able to collect and store crime incidents and protocols at law enforcement agencies produces a mandatory analyze it using different tools to process crimes’ data. This would flaw of a slow response. help the Law Enforcement Agencies in forecasting crime and With the above mentioned flaws of the system the crime rate is likely preventing it before it actually occurs. Thus, leads to a reduction in to increase naturally. Despite several governmental efforts and the crime rate. The system would also benefit the general public by restructuring of the law enforcement agencies/departments, the providing the victims an unconventional and advanced medium to history asserts this trend too. report the criminal incidents they are subjected to. In order to address these problems the need of a crime forecasting system arises. The initial research was based on the consideration of The features of the system if highlighted, takes the form as follows. It; multiple factors specially the Crime Index. This approach employed the use of statistical methods namely Regression, Time Series  Comes out as a decision support system that assists the law Analysis, Double Exponential Smoothing. Crime Index, which is the enforcement agencies in optimal utilization of resources rate of crime over population, was the main input parameter provided  Is able to predict crime patterns by analyzing the graphs based on to these statistical methods, on the basis of which it forecasted real time data sets. results.  Shows the results in multiple views using Google Maps with various perspectives. The forecasting process comprised of three steps:  Provides ease in use with user friendly interfaces due to which no 1. Evaluation of Crime Index. special training would be required. 2. Gathering data.  Improves the quality of results/output with grown data sets over 3. Application of the techniques on the gathered data. the passage of time. However the drawback associated with this approach was that it did  Highlights Gang based criminal activities located within not cater for all the effecting factors, thus less effective and the different parts of the city thus expose criminal social networks. intended scope was not fully covered. For instance, if one considers  Provides information regarding criminal Characteristics such as the murder crime, it can be seen as only murder while it may be a their facial appearance, dressing style, nature of weapons used result of an initial crime. i.e. the reasons and causes behind may for crime.
  • 2. possibly be categorized as crimes too, thus affecting the results of 3. Extract important variables. forecasting. 4. Detect outliers and anomalies. The literature survey that was conducted in order to understand and 5. Test underlying assumptions. identify the features that we need to incorporate into the system, as 6. Develop parsimonious models. well as to learn the various approaches that others have taken to 7. Determine optimal factor settings. improve this system. The following table- 2.1 contains summary The disadvantages of using this technique were, features that depicts how have the different systems been  It does not provide definitive decisions always. implemented in terms of the features they provide (details of these  Requires a high degree of judgment systems can be obtained from the first author). Since the system relies heavily on crime data, one of the vital tasks Detective [2] WebCAT[1] CADmine[5 CrimeView ATAC[4] was to collect it. Initially the law enforcement agencies were Data Features contacted for this purpose but the effort was not productive. ] [3] Therefore the data was acquired through Interviews, Questionnaire, Observations and Research. These techniques ensure first hand real data with magnified volume and minimum error. Generally most of Statistical the cases are not reported due to the problems people have to face in Model × reporting them to the law enforcement agencies. This Web based approach works as a remedy to this problem. Spatial Analysis × × 3.2 Architecture Data Entry × × × × The underlying database design which serves data storage and retrieval. Its design is fully optimized and synchronized with the questionnaire and has the flexibility for future enhancements and Detective [2] WebCAT[1] CADmine[5 adjustments. New factors may be added according to the dynamic CrimeView ATAC[4] Data crime patterns in order to improve the effectiveness of the system. Features ] [3] The context diagram serves to focus attention on the system boundary and helps in clarifying the precise scope of the system. Figure 3.1 Calendaring × × × × . Reporting Data Mining Artificial Neural Networks × × × × Environmental Mapping Alerts × × Table 2.1 (Benchmark) 3. METHODS and MATERIALS Figure 3.1- the context diagram 3.1 The Techniques 3.3 Environmental Mapping Exploratory Data Analysis lies at the core of Crime Forecasting The geographical data assists in mapping with the help of Google System. Exploratory data analysis (EDA) used to analyze data for APIs which act as a bridge between our system and Google Maps. the purpose of formulating hypotheses worth testing. It was so named The process is explained in Figure 3.2 by John Tukey, Weiss (2002) . The objectives of EDA are to:  Suggest hypotheses about the causes of observed phenomena  Assess assumptions on which statistical inference will be based  Support the selection of appropriate statistical tools and techniques  Provide a basis for further data collection through surveys or experiments. The approach under consideration employs a variety of techniques (mostly graphical) to, 1. Maximize insight into a data set. Figure 3.2 – The Mapping Process 2. Uncover underlying structure.
  • 3. 3.4 The dependency contours Figure 3.3 shows the dependencies of different qualitative entities which ensures the relationship among them. This vital result authenticates the effectiveness, productivity and the workability of the system. The contours and the color intensities confirm the relationship between areas and crimes. Figure 4.1 4.2 The Forecasting Once the data is seen there comes the awaited output of the system i.e. Figure 3.3 - Contours forecasting. The forecast can be seen as per area with different factors and aspects. This provides a closely conclusive and demographic 3.5 Statistics picture to the local law enforcement agencies. For instance the parameters of behavior and age tell about what social category of Figure 3.4 verifies the hypothesis made against the authenticity of data people is to be focused to address the increase in crime in the collected through this system as most of the crimes remain unreported respective area. due to the procedural hindrances. The analysis conducted on the involvement of number of criminals assists in prediction of the nature of crime expected as per gang based activities. 4. CONCLUSION A thorough study revealed that there are certain areas of criminology which are needed to be addressed using computational capabilities and techniques. Inferential engine and prediction on the basis of the implementation of statistical and AI techniques through computers have been found very beneficial if exploited for the purpose. Figure 3.4 Following are the results after the implementation of our efforts 4. THE INTERFACES  Standardization of input in form of a questionnaire and designing of a centralized database 4.1 Data Representation  Analytical Engines The following snapshot in figure shows the overall picture of criminal  Inferential Engines activities per area. Moreover different colors represent different  Map based visualization of crime affected areas intensities of crimes. At a glance delivery of information increases the visual value of the system. The interface reflects the changes in real 5. FUTURE WORK time as per updated data. Thus the most current picture of crimes per area appears with shifts and trends. The interface is a result of high To increase the usefulness of Crime Forecasting system, one of the profile integration of the data and Google Maps which enhances the enhancements that can be made is to develop the system as a mobile effectiveness and value of the system manifold. application. This would allow the user to report the crime remotely as soon as he observes one and eliminate the need for a desktop system to report a crime. To increase the effectiveness of the Crime
  • 4. Forecasting System, more techniques could be used for forecasting crime. Techniques belonging to the Data Mining and Artificial Intelligence field may be incorporated into the system to make the forecasting process even more effective and efficient. 6. ACKNOWLEDGEMENTS We would like to express our deepest gratitude to ALLAH the ALMIGHTY, who bestowed upon us enough strength to make this research possible. Secondly, we would like to thank Prof. Dr. Sayeed Ghani (Associate Dean, FCS-IBA) who supported the first author morally to pursue his research for the sake of improving social grounds. Special thanks to Sayyedah Muneezah Hashim (Software Engineer/Technical Writer, Assurety Consulting Inc. Alumni Bahria University Karachi) who actually initiated this study of Crime Forecasting System in Karachi, Pakistan and let us extend this study with her kind permission. 7. REFERENCES Boba, R. (2001), Introductory Guide to Crime Analysis and Mapping, Report to the Office of Community Oriented Policing Services Cooperative Agreement, US Department of Justice; Washington DC, (pg. 9) Read, T., and Tilly, N. (2000), Crime Reduction Research Series Paper 6, Not Rocket Science? Home Office; London, (pg. 28-35) Weiss A. Neil (2002), Introductory Statistics, 5th Edition, Addison Wesley. (pg. 193) ATAC | Automated Tactical Analysis of Crime http://www.bairsoftware.com/atac.html CADmine http://www.coronasolutions.com/products/cadmine.shtml CrimeView® http://www.theomegagroup.com/police/crime_mapping_solutions.ht ml DataDetective http://www.sentient.nl/?dden WebCAT™ Crime Analysis System http://www.daprosystems.com/DPSProducts/crimeanalysis.aspx