SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.149-153
      AN INTELLIGENT ANALYSIS OF CRIME DATA USING
        DATA MINING & AUTO CORRELATION MODELS

                Uttam Mande                          Y.Srinivas              J.V.R.Murthy
                  Dept of CSE                        Dept of IT                 Dept of CSE
               GITAM University                   GITAM University             J.N.T.University
                 Visakhapatnam                     Visakhapatnam                 Kakinada



Abstract
The latest technological developments contributed
                                                            The usage of data mining concept help to explore the
significantly towards modernization, at the same
                                                            enormous data and making it possible in reaching the
time increased the concern about the security
                                                            ultimate goal of criminal analysis the usage of data
issues. These technologies have hindered the
                                                            mining techniques have several advantages it helps
effective analysis about the criminals. Application
                                                            to cluster the data based on criminal /crime and
of data mining concepts proved to yield better
                                                            thereby minimizing the search space. Based on the
results in this direction. In this paper, binary
                                                            clusters the classification algorithm can be applied to
clustering and classification techniques have been
                                                            classify the criminal in this paper we also used the
used to analyze the criminal data. The crime data
                                                            auto correlation model authenticate the criminal. The
considered in this paper is from Andhra Pradesh
                                                            rest of paper is organized as follows, section -2 of the
police department this paper aims to potentially
                                                            paper deals with deep insight into fundamentals’ of
identify a criminal based on the witness/clue at the
                                                            crime analysis, in section- 3 the concept of binary
crime spot an auto correlation model is further
                                                            clustering is presented, the auto correlation model is
used to ratify the criminal.
                                                            discussed in section -4, experimentation is
                                                            highlighted in section- 5, the section 6 of the paper
Key words: data mining, clustering, classification,
                                                            focus on the conclusion
autocorrelation, crime
                                                            2. INSIGHT INTO            FUNDAMENTALS’             OF
1. INTRODUCTION
                                                            CRIME ANALYSIS
The present day, changes in social life style and
circumstances of living make the humans to come
                                                            Any crime investigation highlights primarily on two
across phenomena called crime. Various agencies
                                                            issues,    1)     clue/crime    links    2)     criminal
such as POLICE Department, CBI are working
                                                            relating/identification. Crime clues play a vital role in
rigorously to combat the crime. But the challenges to
                                                            the proper identification of criminal. The clues help
analyze the crime and arrest the criminal activities is
                                                            the stepping stone towards the crime analysis, and
becoming more difficult as the crime rate is
                                                            criminal relating is the mapping of the criminal based
increasing [1][2],many models have been projected
                                                            on the clues with data available in the data base, by
by the researchers for effective analysis [3][4].the
                                                            the use of intelligent knowledge mapping.
main disadvantage is that the volume of data with
                                                            In this paper, we have considered the crime data base
respect to the crime activities and criminals increased
                                                            of criminals involved/accused in several types of
,and there is a great need for analyzing the data,
                                                            crimes the criminal activities considered in this paper
hence to have a better model the knowledge about the
                                                            are 1) robbery 2) murder 3) kidnapping 4) riots
crime & the criminal always is always advantageous.
This thought has driven towards the use of data
mining techniques        [ 5]       for analyzing this
voluminous data .


                                                                                                    149 | P a g e
Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.149-153
2.1 crime links                                     3. BINARY CLUSTERING:

The various crime links that were considered include      In order to simplify the analysis process the huge
                                                          dataset available is to be clustered. The clustering in
1) Crime location (place: restaurant, theater, road,      this paper is based on the type of crime. A data set is
   railway station, shop/gold shop, mall, house,          generated from the database available from the
   apartment )                                            Andhra Pradesh police department and a table is
2) Criminal attribute(hair, built, eyebrows ,nose         created by considering the FIR report
   ,teeth, beard , age group,mustache,languages
   known)                                                 The various fields considered including the criminal
3) Criminal psychological behavior can be                 identification numbers, criminal attributes, criminal
   recognized by type of killing                          psychological behavior, crime location, time of crime
                                                          (day/night), witness /clue, the data set is generated by
    We have considered the type of killing as             using the binary data of 1’s & 0’s, 1’s indicating the
    (smooth, removal of parts, harsh) which               presence of attribute and 0’s indicating the absence of
    attributes to the psychological behavior of the       attribute then clustering of the binary data is done as
    criminal                                              proposed by Tao Hi (2005) using the binary
                                                          clustering
4) Modus operandi (object used for crime),
   1)Pistol 2)Rope 3)Stick 4)Knife                        Crimes are categorized in many ways, here we have
                                                          given weights to each type of crime where weighing
    These criminal links help to analyze the dataset
                                                          scheme is considered in the manner all the relative
    there by making the crime investigators to plane
                                                          crimes will be given with near values , after applying
    for identification of the criminal.
                                                          clustering algorithm on this type of crime feature we
                                                          have got four clusters of crime data they are robbery,
                                                          kidnap, murder and riot
2.2 Crime identification

    In order to identify the criminals the
    variables/links that are identified from section
    2.1 are mapped to that of the data base and
    previous knowledge there by solving the crime
    incidents,

    In order to identify a criminal together with
    crime variables that are discussed in section 2.1
    we have considered 1) witness available and 2)
    clues available

    The various witness considered for affective
    identification are discussed in the above section
    if the evidence/witness is not available we have
    considered clues available from the forensics
    such as finger prints ,in particular cases for the
    identification we have considered the mapping of
    both witness & clues to authenticate a criminal.

    In this paper we have considered binary
    clustering to cluster the data base based on type
    of crime and the classification is carried out from                 Fig 1categories of crimes
    the feature available.

                                                                                                  150 | P a g e
Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue 4, July-August 2012, pp.149-153


4. AUTO REGRESSION

In the absence of witness and clues by the forensic at
the criminal spot. In such situations, reverse
investigation has to be done

     Suspect are listed out by

     The type of crime , Type of killing / the way in
     which the incident has happened.

     Modus of operand – used , By the victim type
     ,Time of happening of the incident

 If the incident is with respect to killing , then we
   consider the reason for killing

     Dacoit and murder ,Rape and murder ,Killing
     took place at the time of riot                              Formulae for auto correlation and regression

     Crime committed due to heatedness ,No clue

 Modus of operand of crime                              5. EXPERIMENTATION

     Knife, Pistol, Bomb,rope                               The experimentation is carried out under mat lab
                                                         environment .the generated database considered for
 Type of killing
                                                         experimentation is
     Harsh,Sadistic,From near / from distance

 Time of killing

     Day time,Night time

 Victim type

     Age, Economical status, Gender, Strong ness of
     victim

 Using these feature like type of kill ,associated
   crime mode of the crime, victim type the
   suspects are generated from the criminal history

Among the suspects, to identify a criminal, the
correlation is to be established among the available
evidences and here we use the auto correlation model
to find the most likelihood criminal

The database of short listed criminals(suspects) will
be given to Autocorrelation model

                                                                    Fig2 :the snap shot of data set
                                                                                               151 | P a g e
Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.149-153
                                                            1.Carlile of Berriew Q.C “Data mining: The new
                                                            weapon in the war on terrorism” retrived from the
If the witness is available, at the crime incident, or of   Internet on 28-02-2011
the forensics reports are available, then in such cases,
identification of the criminal is a different case,
where the criminal is mapped with the data available
                                                            2.Cate H. Fred “Legal Standards for Data Mining”
at the crime spot with that of the database and if there    retrieved from the internet on 12-03-2011
is a map, the criminal can be identified. If the            http://www.hunton.com/files/tbl_s47Details/FileUplo
witness or forensics reports are not available, then we     ad265/1250/Cate_Fourth_Amendment.pdf
will take the report on the way the crime has been
taken and we try to relate these features with the          3.Clifton Christopher      (2011). “Encyclopedia
Autocorrelation model and try to investigate the            Britannica: data mining”, Retrieved from the web on
                                                            20-01-2011
criminal. The criminal
                                                            4.Jeff and Harper, Jim “Effective Counterterrorism
                                                            and the Limited Role of Predictive Data Mining”
In the result highest positive value is considered as
                                                            retrieved from the web 12-02-2011
the most likelihood criminal
                                                            5. U.M. Fayyad and R. Uthurusamy, “Evolving Data
                   cid      correlation values              Mining into Solutions for Insights,” Comm. ACM,
                                                            Aug. 2002, pp. 28-31.
                   101      0.750249895876718
                                                            6. W. Chang et al., “An International Perspective on
                   118      0.767249345567653               Fighting Cybercrime,” Proc. 1st NSF/NIJ Symp.
                                                            Intelligence and Security Informatics, LNCS 2665,
                   142      0.743567565585454
                                                            Springer-Verlag, 2003, pp. 379-384.
                   154      0.713427738442316
                                                            7. H. Kargupta, K. Liu, and J. Ryan, “Privacy-
                                                            Sensitive Distributed Data Mining from Multi-Party
                                                            Data,” Proc. 1st NSF/NIJ Symp. Intelligence and
From the above table, it can be seen the Correlation        Security Informatics, LNCS 2665, Springer-Verlag,
value for the criminal 101 is maximum and that              2003, pp. 336-342.April 2004
implies that he is having more likelihood of
                                                            8. M.Chau, J.J. Xu, and H. Chen, “Extracting
committing the crime. This analysis report is used by
                                                            Meaningful Entities from Police Narrative Reports,
the investigating officer for further analysis              Proc.Nat’l Conf. Digital Government Research,
                                                            Digital Government Research Center, 2002, pp. 271-
                                                            275.

6. CONCLUSION:                                              9. A. Gray, P. Sallis, and S. MacDonell, “Software
                                                            Forensics:    Extending      Authorship     Analysis
This paper presents a novel methodology of                  Techniquesto Computer Programs,” Proc. 3rd
identifying a criminal, in the absence of witness or        Biannual Conf.Int’l Assoc. Forensic Linguistics, Int’l
any clue by the forensic experts. In these situations,      Assoc. Forensic Linguistics, 1997, pp. 1-8.
in this paper we have tried to identify the criminal by
                                                            10. R.V. Hauck et al., “Using Coplink to Analyze
mapping the criminal using the method of Auto
                                                            Criminal-Justice Data,” Computer, Mar. 2002, pp.
correlation. The way in which the incident has taken        30-37.
place and the features of the crime are considered to
ratify a criminal.                                          11. T. Senator et al., “The FinCEN Artificial
                                                            Intelligence System: Identifying Potential Money
                                                            Laundering from Reports of Large Cash
                                                            Transactions,” AI Magazine,vol.16, no. 4, 1995, pp.
REFERENCES:                                                 21-39.

                                                            12. W. Lee, S.J. Stolfo, and W. Mok, “A Data
                                                            Mining Framework for Building Intrusion detection
                                                                                                  152 | P a g e
Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.149-153
Models,” Proc. 1999 IEEE Symp. Security and
Privacy, IEEE CS Press, 1999, pp. 120-132. 10. O. de
Vel et al., “Mining E-Mail Content for Author
Identification Forensics,” SIGMOD Record, vol. 30,
no. 4, 2001, pp. 55-64.

13. G. Wang, H. Chen, and H. Atabakhsh,
    “Automatically Detecting Deceptive Criminal
    Identities,” Comm. ACM, Mar. 2004, pp. 70-76.

14. S. Wasserman and K. Faust, Social Network
    Analysis:Methods and Applications, Cambridge
    Univ. Press, 1994.




                                                                                  153 | P a g e

Contenu connexe

Tendances

Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-miningmohammed albash
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Crime analysis of different situations
Crime analysis of different situationsCrime analysis of different situations
Crime analysis of different situationsKanukulaAkhil
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction SystemIRJET Journal
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
kyung_kim_pura
kyung_kim_purakyung_kim_pura
kyung_kim_puraPeter Kim
 
Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsOsokop
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tellArchit Sharma
 
0309JUSTICEITSTANEK
0309JUSTICEITSTANEK0309JUSTICEITSTANEK
0309JUSTICEITSTANEKguest66dc5f
 
Chicago Crime Analysis
Chicago Crime AnalysisChicago Crime Analysis
Chicago Crime AnalysisTom Donoghue
 

Tendances (20)

Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-mining
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Crime analysis of different situations
Crime analysis of different situationsCrime analysis of different situations
Crime analysis of different situations
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
kyung_kim_pura
kyung_kim_purakyung_kim_pura
kyung_kim_pura
 
report
reportreport
report
 
Crime prediction and strategy detection in data mining
Crime prediction and strategy detection in data miningCrime prediction and strategy detection in data mining
Crime prediction and strategy detection in data mining
 
Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tell
 
0309JUSTICEITSTANEK
0309JUSTICEITSTANEK0309JUSTICEITSTANEK
0309JUSTICEITSTANEK
 
Application of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence IntelligenceApplication of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence Intelligence
 
Chicago Crime Analysis
Chicago Crime AnalysisChicago Crime Analysis
Chicago Crime Analysis
 

En vedette

Data mining, prediction, correlation, regression, correlation analysis, regre...
Data mining, prediction, correlation, regression, correlation analysis, regre...Data mining, prediction, correlation, regression, correlation analysis, regre...
Data mining, prediction, correlation, regression, correlation analysis, regre...IJERA Editor
 
A Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsA Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsIJERA Editor
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesIJERA Editor
 

En vedette (6)

Ki2518101816
Ki2518101816Ki2518101816
Ki2518101816
 
Data mining, prediction, correlation, regression, correlation analysis, regre...
Data mining, prediction, correlation, regression, correlation analysis, regre...Data mining, prediction, correlation, regression, correlation analysis, regre...
Data mining, prediction, correlation, regression, correlation analysis, regre...
 
Bb4101307311
Bb4101307311Bb4101307311
Bb4101307311
 
A Survey of String Matching Algorithms
A Survey of String Matching AlgorithmsA Survey of String Matching Algorithms
A Survey of String Matching Algorithms
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphones
 
100 esl-games
100 esl-games100 esl-games
100 esl-games
 

Similaire à U24149153

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic finalTwaha Minai
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Using_data_mining_techniques_for_detecting_terror-.pdf
Using_data_mining_techniques_for_detecting_terror-.pdfUsing_data_mining_techniques_for_detecting_terror-.pdf
Using_data_mining_techniques_for_detecting_terror-.pdfAmita468021
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime typesIJDKP
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...gerogepatton
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsIRJET Journal
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmIJERA Editor
 

Similaire à U24149153 (20)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic final
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Crime
CrimeCrime
Crime
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Bs4301396400
Bs4301396400Bs4301396400
Bs4301396400
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Using_data_mining_techniques_for_detecting_terror-.pdf
Using_data_mining_techniques_for_detecting_terror-.pdfUsing_data_mining_techniques_for_detecting_terror-.pdf
Using_data_mining_techniques_for_detecting_terror-.pdf
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime types
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
 
News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
 

Dernier

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

U24149153

  • 1. Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.149-153 AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University Visakhapatnam Visakhapatnam Kakinada Abstract The latest technological developments contributed The usage of data mining concept help to explore the significantly towards modernization, at the same enormous data and making it possible in reaching the time increased the concern about the security ultimate goal of criminal analysis the usage of data issues. These technologies have hindered the mining techniques have several advantages it helps effective analysis about the criminals. Application to cluster the data based on criminal /crime and of data mining concepts proved to yield better thereby minimizing the search space. Based on the results in this direction. In this paper, binary clusters the classification algorithm can be applied to clustering and classification techniques have been classify the criminal in this paper we also used the used to analyze the criminal data. The crime data auto correlation model authenticate the criminal. The considered in this paper is from Andhra Pradesh rest of paper is organized as follows, section -2 of the police department this paper aims to potentially paper deals with deep insight into fundamentals’ of identify a criminal based on the witness/clue at the crime analysis, in section- 3 the concept of binary crime spot an auto correlation model is further clustering is presented, the auto correlation model is used to ratify the criminal. discussed in section -4, experimentation is highlighted in section- 5, the section 6 of the paper Key words: data mining, clustering, classification, focus on the conclusion autocorrelation, crime 2. INSIGHT INTO FUNDAMENTALS’ OF 1. INTRODUCTION CRIME ANALYSIS The present day, changes in social life style and circumstances of living make the humans to come Any crime investigation highlights primarily on two across phenomena called crime. Various agencies issues, 1) clue/crime links 2) criminal such as POLICE Department, CBI are working relating/identification. Crime clues play a vital role in rigorously to combat the crime. But the challenges to the proper identification of criminal. The clues help analyze the crime and arrest the criminal activities is the stepping stone towards the crime analysis, and becoming more difficult as the crime rate is criminal relating is the mapping of the criminal based increasing [1][2],many models have been projected on the clues with data available in the data base, by by the researchers for effective analysis [3][4].the the use of intelligent knowledge mapping. main disadvantage is that the volume of data with In this paper, we have considered the crime data base respect to the crime activities and criminals increased of criminals involved/accused in several types of ,and there is a great need for analyzing the data, crimes the criminal activities considered in this paper hence to have a better model the knowledge about the are 1) robbery 2) murder 3) kidnapping 4) riots crime & the criminal always is always advantageous. This thought has driven towards the use of data mining techniques [ 5] for analyzing this voluminous data . 149 | P a g e
  • 2. Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.149-153 2.1 crime links 3. BINARY CLUSTERING: The various crime links that were considered include In order to simplify the analysis process the huge dataset available is to be clustered. The clustering in 1) Crime location (place: restaurant, theater, road, this paper is based on the type of crime. A data set is railway station, shop/gold shop, mall, house, generated from the database available from the apartment ) Andhra Pradesh police department and a table is 2) Criminal attribute(hair, built, eyebrows ,nose created by considering the FIR report ,teeth, beard , age group,mustache,languages known) The various fields considered including the criminal 3) Criminal psychological behavior can be identification numbers, criminal attributes, criminal recognized by type of killing psychological behavior, crime location, time of crime (day/night), witness /clue, the data set is generated by We have considered the type of killing as using the binary data of 1’s & 0’s, 1’s indicating the (smooth, removal of parts, harsh) which presence of attribute and 0’s indicating the absence of attributes to the psychological behavior of the attribute then clustering of the binary data is done as criminal proposed by Tao Hi (2005) using the binary clustering 4) Modus operandi (object used for crime), 1)Pistol 2)Rope 3)Stick 4)Knife Crimes are categorized in many ways, here we have given weights to each type of crime where weighing These criminal links help to analyze the dataset scheme is considered in the manner all the relative there by making the crime investigators to plane crimes will be given with near values , after applying for identification of the criminal. clustering algorithm on this type of crime feature we have got four clusters of crime data they are robbery, kidnap, murder and riot 2.2 Crime identification In order to identify the criminals the variables/links that are identified from section 2.1 are mapped to that of the data base and previous knowledge there by solving the crime incidents, In order to identify a criminal together with crime variables that are discussed in section 2.1 we have considered 1) witness available and 2) clues available The various witness considered for affective identification are discussed in the above section if the evidence/witness is not available we have considered clues available from the forensics such as finger prints ,in particular cases for the identification we have considered the mapping of both witness & clues to authenticate a criminal. In this paper we have considered binary clustering to cluster the data base based on type of crime and the classification is carried out from Fig 1categories of crimes the feature available. 150 | P a g e
  • 3. Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.149-153 4. AUTO REGRESSION In the absence of witness and clues by the forensic at the criminal spot. In such situations, reverse investigation has to be done  Suspect are listed out by The type of crime , Type of killing / the way in which the incident has happened. Modus of operand – used , By the victim type ,Time of happening of the incident  If the incident is with respect to killing , then we consider the reason for killing Dacoit and murder ,Rape and murder ,Killing took place at the time of riot Formulae for auto correlation and regression Crime committed due to heatedness ,No clue  Modus of operand of crime 5. EXPERIMENTATION Knife, Pistol, Bomb,rope The experimentation is carried out under mat lab environment .the generated database considered for  Type of killing experimentation is Harsh,Sadistic,From near / from distance  Time of killing Day time,Night time  Victim type Age, Economical status, Gender, Strong ness of victim  Using these feature like type of kill ,associated crime mode of the crime, victim type the suspects are generated from the criminal history Among the suspects, to identify a criminal, the correlation is to be established among the available evidences and here we use the auto correlation model to find the most likelihood criminal The database of short listed criminals(suspects) will be given to Autocorrelation model Fig2 :the snap shot of data set 151 | P a g e
  • 4. Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.149-153 1.Carlile of Berriew Q.C “Data mining: The new weapon in the war on terrorism” retrived from the If the witness is available, at the crime incident, or of Internet on 28-02-2011 the forensics reports are available, then in such cases, identification of the criminal is a different case, where the criminal is mapped with the data available 2.Cate H. Fred “Legal Standards for Data Mining” at the crime spot with that of the database and if there retrieved from the internet on 12-03-2011 is a map, the criminal can be identified. If the http://www.hunton.com/files/tbl_s47Details/FileUplo witness or forensics reports are not available, then we ad265/1250/Cate_Fourth_Amendment.pdf will take the report on the way the crime has been taken and we try to relate these features with the 3.Clifton Christopher (2011). “Encyclopedia Autocorrelation model and try to investigate the Britannica: data mining”, Retrieved from the web on 20-01-2011 criminal. The criminal 4.Jeff and Harper, Jim “Effective Counterterrorism and the Limited Role of Predictive Data Mining” In the result highest positive value is considered as retrieved from the web 12-02-2011 the most likelihood criminal 5. U.M. Fayyad and R. Uthurusamy, “Evolving Data cid correlation values Mining into Solutions for Insights,” Comm. ACM, Aug. 2002, pp. 28-31. 101 0.750249895876718 6. W. Chang et al., “An International Perspective on 118 0.767249345567653 Fighting Cybercrime,” Proc. 1st NSF/NIJ Symp. Intelligence and Security Informatics, LNCS 2665, 142 0.743567565585454 Springer-Verlag, 2003, pp. 379-384. 154 0.713427738442316 7. H. Kargupta, K. Liu, and J. Ryan, “Privacy- Sensitive Distributed Data Mining from Multi-Party Data,” Proc. 1st NSF/NIJ Symp. Intelligence and From the above table, it can be seen the Correlation Security Informatics, LNCS 2665, Springer-Verlag, value for the criminal 101 is maximum and that 2003, pp. 336-342.April 2004 implies that he is having more likelihood of 8. M.Chau, J.J. Xu, and H. Chen, “Extracting committing the crime. This analysis report is used by Meaningful Entities from Police Narrative Reports, the investigating officer for further analysis Proc.Nat’l Conf. Digital Government Research, Digital Government Research Center, 2002, pp. 271- 275. 6. CONCLUSION: 9. A. Gray, P. Sallis, and S. MacDonell, “Software Forensics: Extending Authorship Analysis This paper presents a novel methodology of Techniquesto Computer Programs,” Proc. 3rd identifying a criminal, in the absence of witness or Biannual Conf.Int’l Assoc. Forensic Linguistics, Int’l any clue by the forensic experts. In these situations, Assoc. Forensic Linguistics, 1997, pp. 1-8. in this paper we have tried to identify the criminal by 10. R.V. Hauck et al., “Using Coplink to Analyze mapping the criminal using the method of Auto Criminal-Justice Data,” Computer, Mar. 2002, pp. correlation. The way in which the incident has taken 30-37. place and the features of the crime are considered to ratify a criminal. 11. T. Senator et al., “The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions,” AI Magazine,vol.16, no. 4, 1995, pp. REFERENCES: 21-39. 12. W. Lee, S.J. Stolfo, and W. Mok, “A Data Mining Framework for Building Intrusion detection 152 | P a g e
  • 5. Uttam Mande, Y.Srinivas, J.V.R.Murthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.149-153 Models,” Proc. 1999 IEEE Symp. Security and Privacy, IEEE CS Press, 1999, pp. 120-132. 10. O. de Vel et al., “Mining E-Mail Content for Author Identification Forensics,” SIGMOD Record, vol. 30, no. 4, 2001, pp. 55-64. 13. G. Wang, H. Chen, and H. Atabakhsh, “Automatically Detecting Deceptive Criminal Identities,” Comm. ACM, Mar. 2004, pp. 70-76. 14. S. Wasserman and K. Faust, Social Network Analysis:Methods and Applications, Cambridge Univ. Press, 1994. 153 | P a g e