SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Research in Computer Science
eISSN 2249-8265 Volume 2 Issue 3 (2012) pp. 57-60
© White Globe Publications
www.ijorcs.org



                    CLOUD GIS FOR CRIME MAPPING
                       Harpinder Singh1, Rajneesh Kumar2, Amardeep Singh3, P.K. Litoria4
                            *Punjab Remote Sensing Centre, P.A.U. Campus, Ludhiana
                                          1
                                           Email: harpinder13@rediffmail.com


Abstract: In developing countries, the lack of                presented in a map format allow a better perception,
infrastructure like GPS (Global positioning system)           visualization of spatial patterns and their relationship
and GIS (Geographic Information system) have                  with the neighboring areas. A sophisticated GIS can
hindered the growth of the police department. This            give answers to the queries related to the location,
paper proposes a simple, useful and cost effective            conditions, trends, patterns, routing and modeling.
solution for crime mapping. Google cloud resources
like satellite data, application and GIS software have           Today with the advancements in the web GIS
been used to develop this application. The developer          realm, people can access high resolution satellite
requires only a simple computer connected to the              imagery and vector data using Wikimapia, Google
internet. The source of crime data is the RSS (Really         earth and other mapping websites. Customized maps
Simple Syndication) feeds from various news websites.         and applications can also be created using various
                                                              API’s and websites like Google maps and ESRI online,
Keywords: Cloud GIS, Crime Mapping, Google                    free of cost. A fusion of cloud and GIS can be done to
Fusion Table                                                  create effective applications which have advantages of
                                                              both.
                 I. INTRODUCTION
                                                                               II. RELATED WORK
   Cloud computing is a style of computing where IT
related capabilities (software, infrastructure, platform)         Various applied research studies in the domain of
are provided as a service through the internet. The           archaeology, health, tourism, environment and even
important features of the cloud are its low cost,             vehicle routing have utilized satellite imagery and
flexibility, fast deployment and scalability. Now day’s       spatial vector data available on Google earth and
people can leverage the cloud facilities like getting         Google maps to find solutions to their problems, below
storage, access to application software and also              is a description of such studies. [1] has developed a
processing power online at no cost. One of the best           web-based SOLAP (Spatial online analytical
examples of cloud is the Google documents where you           processing) tool, which relies on the integration of a
can create, manage and store your documents,                  standard Geobrowser (Google Earth) with Mondarin
spreadsheets and presentations online without any             which is an OLAP engine to extract useful information
charges.                                                      from large repositories of data. Archaeological studies
                                                              like [2] and [3] have also used the satellite images
   Geographic information system (GIS) is used to             from Google Earth to mine useful information. [4] and
digitally represent and analyze the geographic features       [5] have used Google earth for the development of
present on the earth’s surface and the events that take       recommendation system for tourist attractions and for
place on it. In the light of the fact that seventy percent    critical analysis. Health related studies like mapping of
of the data we use in our daily life has a geographical       strategic health authorities [6] and creation of a dengue
reference as its denominator, it becomes imperative to        surveillance system [7] have also used Google earth
underline the importance of a system which can                and maps. [8] had used these resources for creating a
represent the given data geographically. It helps to          web spatial decision support system for vehicle routing
bring information collected from diverse sources onto         while [9] used them to map the deep-water horizon oil
a common platform and subsequently generate                   spill. All these studies show that valuable information
meaningful information by integrating non-spatial data        and applications have been created using this online
with the spatial maps, using geography as the common          satellite imagery, maps and spatial analysis tools
feature so that it can be used for making effective           which are free of cost.
decisions for various problems. The collective spatial
and non-spatial information can be very useful for               In most developing countries, the police are not
natural     resource      management,        infrastructure   equipped with infrastructure like GPS and GIS for
development and various projects as information when          mapping of crime. This infrastructure is costly, its



                                                                               www.ijorcs.org
setup is time consuming and requires trained                 manpower to operate and manage it. But, the
advantages of viewing data in the form of a map are          geographic co-ordinates but most of the news websites
massive as compared to grasping tabular data of crime              in developing countries do not provide it.
incidents. A crime map gives a comprehensive view of
the controlled area and it is easy to identify spatial                          III. OBJECTIVE
patterns and incident clusters which can be used as a            The main objective of this applied research is to
decision support system to control the crime.                develop a cost effective decision support system which
According to [10] crime mappers can unlock the               will help the police department to map and analyze
spatial patterns and strive for a better theoretical         crime. This system combines the spatial and non-
understanding of the role of geography and                   spatial data to derive meaningful information.
opportunity, as well as enabling practical crime             Google’s cloud and GIS technology has been used for
prevention solutions that are tailored to specific places.   this study. The crime information (non-spatial data)
[11] and [12] also emphasizes the use of geo-spatial         source is the RSS feeds from various newspapers and
information and communication technology tools for           news channels websites. The spatial data is in the
spatial and 3D analysis in crime related studies.            form of the satellite imagery on Google maps, no GPS
   Input data for such a system is collected through a       is required for this study.
  GPS and satellite imagery. A GPS enabled device is
                                                                            IV. METHODOLOGY
  used to collect crime location points and the satellite
   imagery can be used as a base layer or create base        The Methodology of the study is as follows:
  vector layers representing roads, settlements, utility
                                                             1)       Crime related news is collected using RSS
 network, rivers, canals etc. Input data for this study is
                                                              feeds. The news is collected daily in Google docs
   collected from the RSS (Really Simple Syndicate)
                                                              spreadsheet using the ImportFeed() function. A
       feeds from various news websites. RSS is a
                                                              spreadsheet is assigned to each RSS feed as shown in
   syndication method for delivering content to users.
                                                              Figure 1. The crime related news is extracted
  [13] has customized the RSS aggregator software to
                                                              manually from the collection of news and formatted
collect content based on both time and location so that
                                                              in a desired format with attributes like location, type
the RSS protocol can work for location based services.
                                                              of crime, details, link to the news web page etc in a
   There are various websites which provide GeoRSS
                                                              final spreadsheet.
 feeds which can be mapped easily as they contain the




                                    Figure 1 - RSS feed news data in Google spreadsheet
 2) A new table is created in Google documents using           addition to other attributes is converted to a fusion
 the import from Google spreadsheet option. The final          table as shown in Figure 2.
 spreadsheet which contains the location attribute in

                                                                               www.ijorcs.org
Cloud GIS for Crime Mapping                                                                                           59




                                          Figure 2 – Data in Google Fusion Table
3) Using the option (visualize as a map) available in       police infrastructure, fire brigade, hospitals, and
the Google fusion tables the table is visualized as a       telecommunication network setups, entry/exit points of
map as shown in Figure 3. One point location is             the city and other main landmarks of the study area
generated automatically for each row in the table. The      using Google imagery. This collective information can
geocoding is done based on the location attribute in the    be useful for emergency planning, preparedness,
table. Geocoding is the process to convert the address      warning, relief and mitigation. Google API’s will be
in text format to point location in the GIS. The location   used to automate the tasks. Data mining techniques
of all the geocoded points is checked. Further, the         [14] will be used to automatically extract the crime
export to KML (Keyhole Markup Language) option is           related news from the collected news data and arrange
used to save the generated points on your system.           it in the desired format.
4) This point layer is generated daily to map the crime        An efficient and cost effective decision support
in the area of interest.                                    system will be created for the administrators. To
                                                            develop this system no satellite data, application and
                                                            GIS software is required on the developer’s computer
                                                            only an internet connection is required. The same
                                                            methodology can be used to map accidents and other
                                                            events.
                                                               The only limitation of this study is that the location
                                                            of the crime specified in the news is generalized
                                                            therefore the generated point location is not very
                                                            accurate and comparable to the point location taken by
                                                            a GPS.

                                                                              VI. REFERENCES
                                                             [1] S. Di Martino, et al., "Spatial OnLine Analytical
                                                                 Processing of Geographic Data through the Google
Figure 3 – Google Fusion Table data visualized as a map
                                                                 Earth Interface Geocomputation, Sustainability and
                                                                 Environmental Planning." vol. 348, B. Murgante, et al.,
                    V.   RESULTS                                 Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 163-
   It is proposed to build a blog which will have daily,         182.
weekly and monthly crime maps which will help to             [2] [2] D. Kaimaris, et al., "Comparative analysis on the
identify crime patterns and clusters. The crime will be          archaeological content of imagery from Google Earth,"
categorized into theft, murder, snatching and other              Journal of Cultural Heritage, vol. 12, pp. 263-269,
                                                                 2011.
classes. The main objective of these maps is to
identify crime prone areas. It is also proposed to map       [3] D. Kennedy and M. C. Bishop, "Google earth and the
                                                                 archaeology of Saudi Arabia. A case study from the
ancillary information like location of police stations,


                                                                                www.ijorcs.org
60                                                         Harpinder Singh, Rajneesh Kumar, Amardeep Singh, P.K. Litoria

     Jeddah area," Journal of Archaeological Science, vol.
     38, pp. 1284-1293, 2011.
[4] F.-M. Hsu, et al., "Design and implementation of an
     intelligent recommendation system for tourist
     attractions: The integration of EBM model, Bayesian
     network and Google Maps," Expert Systems with
     Applications, vol. 39, pp. 3257-3264, 2012.
[5] P. Lisa, "Digging into Google Earth: An analysis of
     “Crisis in Darfur”," Geoforum, vol. 40, pp. 535-545,
     2009.
[6] M. Boulos, "Web GIS in practice III: creating a simple
     interactive map of England's Strategic Health
     Authorities using Google Maps API, Google Earth
     KML, and MSN Virtual Earth Map Control,"
     International Journal of Health Geographics, vol. 4, pp.
     1-8, 2005.
[7] A. Chang, et al., "Combining Google Earth and GIS
     mapping technologies in a dengue surveillance system
     for developing countries," International Journal of
     Health Geographics, vol. 8, pp. 1-11, 2009.
[8] L. Santos, et al., "A web spatial decision support
     system for vehicle routing using Google Maps,"
     Decision Support Systems, vol. 51, pp. 1-9, 2011.
[9] E. Bradley, et al., "Google Earth and Google Fusion
     Tables in support of time-critical collaboration:
     Mapping the deepwater horizon oil spill with the
     AVIRIS airborne spectrometer," Earth Science
     Informatics, vol. 4, pp. 169-179, 2011.
[10] J. Ratcliffe, "Crime Mapping: Spatial and Temporal
     Challenges Handbook of Quantitative Criminology,"
     A. R. Piquero and D. Weisburd, Eds., ed: Springer
     New York, 2010, pp. 5-24.
[11] J. G. J. Schaaik and J. J. Kemp, "Real Crimes on
     Virtual Maps: The Application of Geography and GIS
     in Criminology Geospatial Technology and the Role of
     Location in Science." vol. 96, H. J. Scholten, et al.,
     Eds., ed: Springer Netherlands, 2009, pp. 217-237.
[12] M. Wolff and H. Asche, "Geospatial Crime Scene
     Investigation – From Hotspot Analysis to Interactive
     3D Visualization Computational Science and Its
     Applications – ICCSA 2009." vol. 5592, O. Gervasi, et
     al., Eds., ed: Springer Berlin / Heidelberg, 2009, pp.
     285-299.
[13] R. Cammack, "Open Content Web Mapping Service: A
     Really Simple Syndication (RSS) Approach Location
     Based Services and TeleCartography," G. Gartner, et
     al., Eds., ed: Springer Berlin Heidelberg, 2007, pp.
     417-431.
[14] B. Berendt, "Text Mining for News and Blogs
     Analysis Encyclopedia of Machine Learning," C.
     Sammut and G. I. Webb, Eds., ed: Springer US, 2010,
     pp. 968-972.




                                                                                 www.ijorcs.org

Contenu connexe

Tendances

Introduction to GIS
Introduction to GISIntroduction to GIS
Introduction to GISEhsan Hamzei
 
Gis powerpoint
Gis powerpointGis powerpoint
Gis powerpointkaushdave
 
Global information system ppt
Global information system pptGlobal information system ppt
Global information system pptGhayasHaiderSajid
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)Siva Mbbs
 
What is GIS
What is GISWhat is GIS
What is GISEsri
 
Geographical Information System and Karnataka Forest cover digitization
Geographical Information System and Karnataka Forest cover digitizationGeographical Information System and Karnataka Forest cover digitization
Geographical Information System and Karnataka Forest cover digitizationKamlesh Kumar
 
Integrating GIS to financial data
Integrating GIS to financial dataIntegrating GIS to financial data
Integrating GIS to financial dataeventspat
 
Gis applications in tourism a tool for sustainable tourism
Gis applications in tourism  a tool for sustainable tourismGis applications in tourism  a tool for sustainable tourism
Gis applications in tourism a tool for sustainable tourismpankaj kumar
 
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable Environment
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable EnvironmentGEO-N-VIRON webinar talk on Geospatial Technology in Sustainable Environment
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable EnvironmentAdityaAllamraju1
 
Open source health gis presentation final
Open source health gis  presentation finalOpen source health gis  presentation final
Open source health gis presentation finalJISC GECO
 
GIS - Project Planning and Implementation
GIS - Project Planning and ImplementationGIS - Project Planning and Implementation
GIS - Project Planning and ImplementationMalla Reddy University
 
Dynamic Land-Use Map Based on Twitter Data
Dynamic Land-Use Map Based on Twitter DataDynamic Land-Use Map Based on Twitter Data
Dynamic Land-Use Map Based on Twitter DataYuyun Wabula
 
Intro of geographic info system
Intro of geographic info systemIntro of geographic info system
Intro of geographic info systemJanak Parmar
 
GIS Desktop and how it works.
GIS Desktop and how it works.GIS Desktop and how it works.
GIS Desktop and how it works.Joymike YIGA
 
Introduction To Geographical Information System (GIS)
Introduction To Geographical Information System (GIS) Introduction To Geographical Information System (GIS)
Introduction To Geographical Information System (GIS) Ajay Singh Lodhi
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)subhashB10
 

Tendances (20)

Introduction to GIS
Introduction to GISIntroduction to GIS
Introduction to GIS
 
Gis powerpoint
Gis powerpointGis powerpoint
Gis powerpoint
 
Global information system ppt
Global information system pptGlobal information system ppt
Global information system ppt
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
 
What is GIS
What is GISWhat is GIS
What is GIS
 
Geographical Information System and Karnataka Forest cover digitization
Geographical Information System and Karnataka Forest cover digitizationGeographical Information System and Karnataka Forest cover digitization
Geographical Information System and Karnataka Forest cover digitization
 
Integrating GIS to financial data
Integrating GIS to financial dataIntegrating GIS to financial data
Integrating GIS to financial data
 
Gis applications in tourism a tool for sustainable tourism
Gis applications in tourism  a tool for sustainable tourismGis applications in tourism  a tool for sustainable tourism
Gis applications in tourism a tool for sustainable tourism
 
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable Environment
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable EnvironmentGEO-N-VIRON webinar talk on Geospatial Technology in Sustainable Environment
GEO-N-VIRON webinar talk on Geospatial Technology in Sustainable Environment
 
Overview of gis new
Overview of gis newOverview of gis new
Overview of gis new
 
Open source health gis presentation final
Open source health gis  presentation finalOpen source health gis  presentation final
Open source health gis presentation final
 
GIS - Project Planning and Implementation
GIS - Project Planning and ImplementationGIS - Project Planning and Implementation
GIS - Project Planning and Implementation
 
29
2929
29
 
Components of GIS
Components of GISComponents of GIS
Components of GIS
 
Dynamic Land-Use Map Based on Twitter Data
Dynamic Land-Use Map Based on Twitter DataDynamic Land-Use Map Based on Twitter Data
Dynamic Land-Use Map Based on Twitter Data
 
Intro of geographic info system
Intro of geographic info systemIntro of geographic info system
Intro of geographic info system
 
GIS Desktop and how it works.
GIS Desktop and how it works.GIS Desktop and how it works.
GIS Desktop and how it works.
 
Introduction To Geographical Information System (GIS)
Introduction To Geographical Information System (GIS) Introduction To Geographical Information System (GIS)
Introduction To Geographical Information System (GIS)
 
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)GEOGRAPHICAL INFORMATION SYSTEM (GIS)
GEOGRAPHICAL INFORMATION SYSTEM (GIS)
 
Introduction to GIS
Introduction to GISIntroduction to GIS
Introduction to GIS
 

En vedette

Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis Yawen Li
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

En vedette (9)

Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Cloud GIS for Crime Mapping

Similaire à Cloud GIS for Crime Mapping (20)

Gis
GisGis
Gis
 
Gis
GisGis
Gis
 
introduction to GIS
introduction to GIS introduction to GIS
introduction to GIS
 
gis.pdf
gis.pdfgis.pdf
gis.pdf
 
Smart navigation system book
Smart navigation system bookSmart navigation system book
Smart navigation system book
 
Web GIS
Web GISWeb GIS
Web GIS
 
5.0000099.pdf
5.0000099.pdf5.0000099.pdf
5.0000099.pdf
 
Mrp Intrim
Mrp IntrimMrp Intrim
Mrp Intrim
 
GIS for geophysics.pptx
GIS for geophysics.pptxGIS for geophysics.pptx
GIS for geophysics.pptx
 
Gis
GisGis
Gis
 
Principles of GIS unit 2
Principles of GIS unit 2Principles of GIS unit 2
Principles of GIS unit 2
 
survey paper 2
survey paper 2survey paper 2
survey paper 2
 
INTRODUCTION TO GIS
INTRODUCTION TO GISINTRODUCTION TO GIS
INTRODUCTION TO GIS
 
1_GEOGRAPHIC INFORMATION SYSTEMSTEM.pptx
1_GEOGRAPHIC INFORMATION SYSTEMSTEM.pptx1_GEOGRAPHIC INFORMATION SYSTEMSTEM.pptx
1_GEOGRAPHIC INFORMATION SYSTEMSTEM.pptx
 
GIS in Nutshell
GIS in NutshellGIS in Nutshell
GIS in Nutshell
 
Ar2419141919
Ar2419141919Ar2419141919
Ar2419141919
 
GIS in Civil Engineering
GIS in Civil EngineeringGIS in Civil Engineering
GIS in Civil Engineering
 
Fundamentals_of_GIS_Estoque.pdf
Fundamentals_of_GIS_Estoque.pdfFundamentals_of_GIS_Estoque.pdf
Fundamentals_of_GIS_Estoque.pdf
 
FINAL 31,12,10
FINAL 31,12,10FINAL 31,12,10
FINAL 31,12,10
 
Chapter one gis
Chapter one gisChapter one gis
Chapter one gis
 

Plus de IJORCS

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsIJORCS
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4IJORCS
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemIJORCS
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionIJORCS
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...IJORCS
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2IJORCS
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1IJORCS
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template MatchingIJORCS
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...IJORCS
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemIJORCS
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...IJORCS
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmIJORCS
 

Plus de IJORCS (20)

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 

Dernier

Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Cloud GIS for Crime Mapping

  • 1. International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 3 (2012) pp. 57-60 © White Globe Publications www.ijorcs.org CLOUD GIS FOR CRIME MAPPING Harpinder Singh1, Rajneesh Kumar2, Amardeep Singh3, P.K. Litoria4 *Punjab Remote Sensing Centre, P.A.U. Campus, Ludhiana 1 Email: harpinder13@rediffmail.com Abstract: In developing countries, the lack of presented in a map format allow a better perception, infrastructure like GPS (Global positioning system) visualization of spatial patterns and their relationship and GIS (Geographic Information system) have with the neighboring areas. A sophisticated GIS can hindered the growth of the police department. This give answers to the queries related to the location, paper proposes a simple, useful and cost effective conditions, trends, patterns, routing and modeling. solution for crime mapping. Google cloud resources like satellite data, application and GIS software have Today with the advancements in the web GIS been used to develop this application. The developer realm, people can access high resolution satellite requires only a simple computer connected to the imagery and vector data using Wikimapia, Google internet. The source of crime data is the RSS (Really earth and other mapping websites. Customized maps Simple Syndication) feeds from various news websites. and applications can also be created using various API’s and websites like Google maps and ESRI online, Keywords: Cloud GIS, Crime Mapping, Google free of cost. A fusion of cloud and GIS can be done to Fusion Table create effective applications which have advantages of both. I. INTRODUCTION II. RELATED WORK Cloud computing is a style of computing where IT related capabilities (software, infrastructure, platform) Various applied research studies in the domain of are provided as a service through the internet. The archaeology, health, tourism, environment and even important features of the cloud are its low cost, vehicle routing have utilized satellite imagery and flexibility, fast deployment and scalability. Now day’s spatial vector data available on Google earth and people can leverage the cloud facilities like getting Google maps to find solutions to their problems, below storage, access to application software and also is a description of such studies. [1] has developed a processing power online at no cost. One of the best web-based SOLAP (Spatial online analytical examples of cloud is the Google documents where you processing) tool, which relies on the integration of a can create, manage and store your documents, standard Geobrowser (Google Earth) with Mondarin spreadsheets and presentations online without any which is an OLAP engine to extract useful information charges. from large repositories of data. Archaeological studies like [2] and [3] have also used the satellite images Geographic information system (GIS) is used to from Google Earth to mine useful information. [4] and digitally represent and analyze the geographic features [5] have used Google earth for the development of present on the earth’s surface and the events that take recommendation system for tourist attractions and for place on it. In the light of the fact that seventy percent critical analysis. Health related studies like mapping of of the data we use in our daily life has a geographical strategic health authorities [6] and creation of a dengue reference as its denominator, it becomes imperative to surveillance system [7] have also used Google earth underline the importance of a system which can and maps. [8] had used these resources for creating a represent the given data geographically. It helps to web spatial decision support system for vehicle routing bring information collected from diverse sources onto while [9] used them to map the deep-water horizon oil a common platform and subsequently generate spill. All these studies show that valuable information meaningful information by integrating non-spatial data and applications have been created using this online with the spatial maps, using geography as the common satellite imagery, maps and spatial analysis tools feature so that it can be used for making effective which are free of cost. decisions for various problems. The collective spatial and non-spatial information can be very useful for In most developing countries, the police are not natural resource management, infrastructure equipped with infrastructure like GPS and GIS for development and various projects as information when mapping of crime. This infrastructure is costly, its www.ijorcs.org
  • 2. setup is time consuming and requires trained manpower to operate and manage it. But, the advantages of viewing data in the form of a map are geographic co-ordinates but most of the news websites massive as compared to grasping tabular data of crime in developing countries do not provide it. incidents. A crime map gives a comprehensive view of the controlled area and it is easy to identify spatial III. OBJECTIVE patterns and incident clusters which can be used as a The main objective of this applied research is to decision support system to control the crime. develop a cost effective decision support system which According to [10] crime mappers can unlock the will help the police department to map and analyze spatial patterns and strive for a better theoretical crime. This system combines the spatial and non- understanding of the role of geography and spatial data to derive meaningful information. opportunity, as well as enabling practical crime Google’s cloud and GIS technology has been used for prevention solutions that are tailored to specific places. this study. The crime information (non-spatial data) [11] and [12] also emphasizes the use of geo-spatial source is the RSS feeds from various newspapers and information and communication technology tools for news channels websites. The spatial data is in the spatial and 3D analysis in crime related studies. form of the satellite imagery on Google maps, no GPS Input data for such a system is collected through a is required for this study. GPS and satellite imagery. A GPS enabled device is IV. METHODOLOGY used to collect crime location points and the satellite imagery can be used as a base layer or create base The Methodology of the study is as follows: vector layers representing roads, settlements, utility 1) Crime related news is collected using RSS network, rivers, canals etc. Input data for this study is feeds. The news is collected daily in Google docs collected from the RSS (Really Simple Syndicate) spreadsheet using the ImportFeed() function. A feeds from various news websites. RSS is a spreadsheet is assigned to each RSS feed as shown in syndication method for delivering content to users. Figure 1. The crime related news is extracted [13] has customized the RSS aggregator software to manually from the collection of news and formatted collect content based on both time and location so that in a desired format with attributes like location, type the RSS protocol can work for location based services. of crime, details, link to the news web page etc in a There are various websites which provide GeoRSS final spreadsheet. feeds which can be mapped easily as they contain the Figure 1 - RSS feed news data in Google spreadsheet 2) A new table is created in Google documents using addition to other attributes is converted to a fusion the import from Google spreadsheet option. The final table as shown in Figure 2. spreadsheet which contains the location attribute in www.ijorcs.org
  • 3. Cloud GIS for Crime Mapping 59 Figure 2 – Data in Google Fusion Table 3) Using the option (visualize as a map) available in police infrastructure, fire brigade, hospitals, and the Google fusion tables the table is visualized as a telecommunication network setups, entry/exit points of map as shown in Figure 3. One point location is the city and other main landmarks of the study area generated automatically for each row in the table. The using Google imagery. This collective information can geocoding is done based on the location attribute in the be useful for emergency planning, preparedness, table. Geocoding is the process to convert the address warning, relief and mitigation. Google API’s will be in text format to point location in the GIS. The location used to automate the tasks. Data mining techniques of all the geocoded points is checked. Further, the [14] will be used to automatically extract the crime export to KML (Keyhole Markup Language) option is related news from the collected news data and arrange used to save the generated points on your system. it in the desired format. 4) This point layer is generated daily to map the crime An efficient and cost effective decision support in the area of interest. system will be created for the administrators. To develop this system no satellite data, application and GIS software is required on the developer’s computer only an internet connection is required. The same methodology can be used to map accidents and other events. The only limitation of this study is that the location of the crime specified in the news is generalized therefore the generated point location is not very accurate and comparable to the point location taken by a GPS. VI. REFERENCES [1] S. Di Martino, et al., "Spatial OnLine Analytical Processing of Geographic Data through the Google Figure 3 – Google Fusion Table data visualized as a map Earth Interface Geocomputation, Sustainability and Environmental Planning." vol. 348, B. Murgante, et al., V. RESULTS Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 163- It is proposed to build a blog which will have daily, 182. weekly and monthly crime maps which will help to [2] [2] D. Kaimaris, et al., "Comparative analysis on the identify crime patterns and clusters. The crime will be archaeological content of imagery from Google Earth," categorized into theft, murder, snatching and other Journal of Cultural Heritage, vol. 12, pp. 263-269, 2011. classes. The main objective of these maps is to identify crime prone areas. It is also proposed to map [3] D. Kennedy and M. C. Bishop, "Google earth and the archaeology of Saudi Arabia. A case study from the ancillary information like location of police stations, www.ijorcs.org
  • 4. 60 Harpinder Singh, Rajneesh Kumar, Amardeep Singh, P.K. Litoria Jeddah area," Journal of Archaeological Science, vol. 38, pp. 1284-1293, 2011. [4] F.-M. Hsu, et al., "Design and implementation of an intelligent recommendation system for tourist attractions: The integration of EBM model, Bayesian network and Google Maps," Expert Systems with Applications, vol. 39, pp. 3257-3264, 2012. [5] P. Lisa, "Digging into Google Earth: An analysis of “Crisis in Darfur”," Geoforum, vol. 40, pp. 535-545, 2009. [6] M. Boulos, "Web GIS in practice III: creating a simple interactive map of England's Strategic Health Authorities using Google Maps API, Google Earth KML, and MSN Virtual Earth Map Control," International Journal of Health Geographics, vol. 4, pp. 1-8, 2005. [7] A. Chang, et al., "Combining Google Earth and GIS mapping technologies in a dengue surveillance system for developing countries," International Journal of Health Geographics, vol. 8, pp. 1-11, 2009. [8] L. Santos, et al., "A web spatial decision support system for vehicle routing using Google Maps," Decision Support Systems, vol. 51, pp. 1-9, 2011. [9] E. Bradley, et al., "Google Earth and Google Fusion Tables in support of time-critical collaboration: Mapping the deepwater horizon oil spill with the AVIRIS airborne spectrometer," Earth Science Informatics, vol. 4, pp. 169-179, 2011. [10] J. Ratcliffe, "Crime Mapping: Spatial and Temporal Challenges Handbook of Quantitative Criminology," A. R. Piquero and D. Weisburd, Eds., ed: Springer New York, 2010, pp. 5-24. [11] J. G. J. Schaaik and J. J. Kemp, "Real Crimes on Virtual Maps: The Application of Geography and GIS in Criminology Geospatial Technology and the Role of Location in Science." vol. 96, H. J. Scholten, et al., Eds., ed: Springer Netherlands, 2009, pp. 217-237. [12] M. Wolff and H. Asche, "Geospatial Crime Scene Investigation – From Hotspot Analysis to Interactive 3D Visualization Computational Science and Its Applications – ICCSA 2009." vol. 5592, O. Gervasi, et al., Eds., ed: Springer Berlin / Heidelberg, 2009, pp. 285-299. [13] R. Cammack, "Open Content Web Mapping Service: A Really Simple Syndication (RSS) Approach Location Based Services and TeleCartography," G. Gartner, et al., Eds., ed: Springer Berlin Heidelberg, 2007, pp. 417-431. [14] B. Berendt, "Text Mining for News and Blogs Analysis Encyclopedia of Machine Learning," C. Sammut and G. I. Webb, Eds., ed: Springer US, 2010, pp. 968-972. www.ijorcs.org