SlideShare une entreprise Scribd logo
1  sur  43
CRIME PATTERN DETECTION
CONTENTS What is crime? Types of crime What makes one commit crime? Statistics Effects of crime ,[object Object],Detection ,[object Object]
 Pattern Analysis
 Pattern Results
 Advantages of CPD
 Limitations of CPD
 Conclusions
 Future Direction,[object Object]
Types of crime PROPERTY CRIME ,[object Object]
 Theft
 Motor vehicle theft
 ArsonCORRUPTION ORGANIZED CRIME ,[object Object]
 Gunrunning
 Money laundering
 Extortion
 Murder for hire
 Fraud
 Human trafficking
 Poaching,[object Object]
Peer pressure Criminals have not been taught the difference between ‘right and wrong.’  Mental illness.  A failure to rehabilitate ex-offenders back into society
	The sociologist Zygmunt Bauman argues that “criminals steal status items in order to appear ‘normal’ within such a materialistic society”
The peak age of criminal activity is during the years 16-25.  WHAT MAKES THEM COMMIT THEM?
Boys often have to ‘prove’ their masculinity which can, at times, result in criminal activity The likelihood of a young person belonging to a subculture is high, and some subcultures engage in criminal behavior Young people may have few legitimate means available of acquiring material goods Less responsibilities Teenage rebellion can lead to people breaking the law
negative impacts of crime upon an area
Depopulation, particularly in urban areas High levels of crime may damage community spirit and result in less neighborliness.  High crime levels can contribute to environmental poverty Once a region with a high level of crime is labeling as a bad area, it might become a ghetto
Several causes of deviant behavior that you also need to be aware of
People may feel alienated from society.  Deviant behavior may simply be the product of teenage rebellion In order to conform to the subculture of that group, people adopt the ways of the subculture.
STATISTICS
CRIME Pattern DETECTION
Questions investigators face Are there correlations between the crime type and the location of the incident?  What are the distributions of crime types involving suspects of different ethnic origin?  How can I quickly extract reports characterized by certain parameters of interest?  For example: robberies performed by white teenagers involving the knife threat. Are there correlations between the type of crime, weapon employed, and the location of the incident? What is the most typical weapon in cases when high school students are charged with weapon possession?
Why crime pattern analysis? 	To implement a data analysis framework which works with the geospatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. 	To use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy.
Steps involved in crime pattern analysis Determine geo-spatial plots of crime in a city Using proper clustering techniques to identify patterns Analyzing patterns and drawing conclusions
Step #1 DETERMINE GEO-SPATIAL PLOTS OF CRIME IN A CITY Collecting Information  Police department records Electronic systems for crime reporting. (N.D.A) Narrative or description of the crime Modus Operandi Translate occurrences of crime into plots on a geographical map of a city
STEP #2 USING PROPER CLUSTERING TECHNIQUES TO IDENTIFY PATTERNS
CLUSTERING Crime terminology  a cluster is a group of crimes in a geographical region or a hot spot of crime.  Data mining terminology  a cluster is group of similar data points (a possible crime pattern)
	Cluster analysis or clustering is the assignment of a set of observations into subsets (called clusters) so that observations in the same cluster are similar in some sense.
	Clustering is a method of unsupervised learning, and a common technique for statistical data analysis used in many fields, including  machine learning,  data mining,  pattern recognition,  image analysis,  information retrieval, and  bioinformatics.
Clustering Technique 	Task of identifying groups of records that are similar between themselves but different from the rest of the data and of finding the variables providing the best clustering 	Clusters will useful for identifying a crime spree committed by one or same group of suspects.
	These clusters will then be presented to the detectives to drill down using their domain expertise. 	Automated detection of crime patterns, allows the detectives to focus on crime sprees first and solving one of these crimes results in solving the whole spree”  groups of incidents suspected to be one spree, the complete evidence can be built from the different bits of information from each of the crime incidents.
Why Clustering? Crimes vary in nature widely  Nature of crimes change over time Crime database often contains several unsolved crimes. Less predictive quality for solving future crimes
Why Clustering? 	In order to be able to detect newer and unknown patterns in future, clustering techniques work better. K-Means Clustering was used here.
K-Means Clustering 	The k-means algorithm assigns each point to the cluster whose centroid is nearest. The center is the average of all the points in the cluster 	Example: The data set has three dimensions and the cluster has two points: X = (x1,x2,x3) and Y = (y1,y2,y3). Then the centroid Z becomes Z = (z1,z2,z3) , where              ,              and 

Contenu connexe

Tendances

Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & TrackingAkshay Gujarathi
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentationAshwinBicholiya
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Afnan Rehman
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationVikas Jain
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural sceneshemanthmcqueen
 
Vehicle Detection using Camera
Vehicle Detection using CameraVehicle Detection using Camera
Vehicle Detection using CameraShubham Agrahari
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYsathish sak
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processingpriyadharshini murugan
 

Tendances (20)

Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentation
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)
 
DIP - Image Restoration
DIP - Image RestorationDIP - Image Restoration
DIP - Image Restoration
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and Classification
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols Classification
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural scenes
 
Vehicle Detection using Camera
Vehicle Detection using CameraVehicle Detection using Camera
Vehicle Detection using Camera
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processing
 

En vedette

Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis Yawen Li
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programssantosh kumar
 
Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping IJORCS
 
Webinar - Comparative Analysis of Cloud based Machine Learning Platforms
Webinar - Comparative Analysis of Cloud based Machine Learning PlatformsWebinar - Comparative Analysis of Cloud based Machine Learning Platforms
Webinar - Comparative Analysis of Cloud based Machine Learning PlatformsBigDataCloud
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010Bruno Mmassy
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The BasicsCell Police
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke YansaneAbdoulaye M Yansane
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesDavide Carboni
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyersKlamberg
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointRuben Pertusa Lopez
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacydjtennant
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016bhatiak997
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social NetworkingJodi Gersh
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptYiwei Chen
 

En vedette (19)

Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programs
 
Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping Cloud GIS for Crime Mapping
Cloud GIS for Crime Mapping
 
Webinar - Comparative Analysis of Cloud based Machine Learning Platforms
Webinar - Comparative Analysis of Cloud based Machine Learning PlatformsWebinar - Comparative Analysis of Cloud based Machine Learning Platforms
Webinar - Comparative Analysis of Cloud based Machine Learning Platforms
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social Networking
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
 

Similaire à Crime Pattern Detection using K-Means Clustering

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningAnavadya Shibu
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSameer Darekar
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction ReportRohit Dandona
 
Merseyside Crime Analysis
Merseyside Crime AnalysisMerseyside Crime Analysis
Merseyside Crime AnalysisParang Saraf
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...gerogepatton
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsIRJET Journal
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET Journal
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic finalTwaha Minai
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime typesIJDKP
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
 

Similaire à Crime Pattern Detection using K-Means Clustering (20)

Crime
CrimeCrime
Crime
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
Merseyside Crime Analysis
Merseyside Crime AnalysisMerseyside Crime Analysis
Merseyside Crime Analysis
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Crime forecasting system for soic final
Crime forecasting system for soic finalCrime forecasting system for soic final
Crime forecasting system for soic final
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
01_AJMS_310_21.pdf
01_AJMS_310_21.pdf01_AJMS_310_21.pdf
01_AJMS_310_21.pdf
 
AJMS_5(2)_21.pdf
AJMS_5(2)_21.pdfAJMS_5(2)_21.pdf
AJMS_5(2)_21.pdf
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime types
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation Data
 

Crime Pattern Detection using K-Means Clustering

  • 2.
  • 8.
  • 9.
  • 12.
  • 19.
  • 20. Peer pressure Criminals have not been taught the difference between ‘right and wrong.’ Mental illness. A failure to rehabilitate ex-offenders back into society
  • 21. The sociologist Zygmunt Bauman argues that “criminals steal status items in order to appear ‘normal’ within such a materialistic society”
  • 22. The peak age of criminal activity is during the years 16-25. WHAT MAKES THEM COMMIT THEM?
  • 23. Boys often have to ‘prove’ their masculinity which can, at times, result in criminal activity The likelihood of a young person belonging to a subculture is high, and some subcultures engage in criminal behavior Young people may have few legitimate means available of acquiring material goods Less responsibilities Teenage rebellion can lead to people breaking the law
  • 24. negative impacts of crime upon an area
  • 25. Depopulation, particularly in urban areas High levels of crime may damage community spirit and result in less neighborliness. High crime levels can contribute to environmental poverty Once a region with a high level of crime is labeling as a bad area, it might become a ghetto
  • 26. Several causes of deviant behavior that you also need to be aware of
  • 27. People may feel alienated from society. Deviant behavior may simply be the product of teenage rebellion In order to conform to the subculture of that group, people adopt the ways of the subculture.
  • 29.
  • 31. Questions investigators face Are there correlations between the crime type and the location of the incident? What are the distributions of crime types involving suspects of different ethnic origin? How can I quickly extract reports characterized by certain parameters of interest? For example: robberies performed by white teenagers involving the knife threat. Are there correlations between the type of crime, weapon employed, and the location of the incident? What is the most typical weapon in cases when high school students are charged with weapon possession?
  • 32. Why crime pattern analysis? To implement a data analysis framework which works with the geospatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. To use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy.
  • 33. Steps involved in crime pattern analysis Determine geo-spatial plots of crime in a city Using proper clustering techniques to identify patterns Analyzing patterns and drawing conclusions
  • 34. Step #1 DETERMINE GEO-SPATIAL PLOTS OF CRIME IN A CITY Collecting Information Police department records Electronic systems for crime reporting. (N.D.A) Narrative or description of the crime Modus Operandi Translate occurrences of crime into plots on a geographical map of a city
  • 35. STEP #2 USING PROPER CLUSTERING TECHNIQUES TO IDENTIFY PATTERNS
  • 36. CLUSTERING Crime terminology a cluster is a group of crimes in a geographical region or a hot spot of crime. Data mining terminology a cluster is group of similar data points (a possible crime pattern)
  • 37. Cluster analysis or clustering is the assignment of a set of observations into subsets (called clusters) so that observations in the same cluster are similar in some sense.
  • 38. Clustering is a method of unsupervised learning, and a common technique for statistical data analysis used in many fields, including  machine learning,  data mining,  pattern recognition,  image analysis,  information retrieval, and  bioinformatics.
  • 39. Clustering Technique Task of identifying groups of records that are similar between themselves but different from the rest of the data and of finding the variables providing the best clustering Clusters will useful for identifying a crime spree committed by one or same group of suspects.
  • 40. These clusters will then be presented to the detectives to drill down using their domain expertise. Automated detection of crime patterns, allows the detectives to focus on crime sprees first and solving one of these crimes results in solving the whole spree” groups of incidents suspected to be one spree, the complete evidence can be built from the different bits of information from each of the crime incidents.
  • 41. Why Clustering? Crimes vary in nature widely Nature of crimes change over time Crime database often contains several unsolved crimes. Less predictive quality for solving future crimes
  • 42. Why Clustering? In order to be able to detect newer and unknown patterns in future, clustering techniques work better. K-Means Clustering was used here.
  • 43. K-Means Clustering The k-means algorithm assigns each point to the cluster whose centroid is nearest. The center is the average of all the points in the cluster Example: The data set has three dimensions and the cluster has two points: X = (x1,x2,x3) and Y = (y1,y2,y3). Then the centroid Z becomes Z = (z1,z2,z3) , where   ,  and 
  • 44. K-Means Algorithm Choose the number of clusters, k. Randomly generate k clusters and determine the cluster centers, or directly generate k random points as cluster centers. Assign each point to the nearest cluster center, where "nearest" is defined with respect to one of the distance measures discussed above. Recompute the new cluster centers. Repeat the two previous steps until some convergence criterion is met (usually that the assignment hasn't changed).
  • 45. STEP 2 STEP 1 STEP 3 STEP 4
  • 46. WHY DATA MINING APPROACH? not be easy for a computer data analyst or detective to identify these patterns by simple querying 2. deal with enormous amounts of data and dealing with noisy or missing data about the crime incidents
  • 47. STEPS INVOLVED IN CLUSTERING Sorting of records – first sort will be on the most important characteristic based on the detective’s experience.
  • 48. 2. Use data mining to detect much more complex patterns since in real life there are many attributes or factors for crime and often there is partial information available about the crime. Identify the significant attributes for the clustering. Placing different weights on different attributes dynamically based on the crime types being clustered
  • 49. 5. Cluster the dataset for crime patterns and then present the results to the detective or the domain expert along with the statistics of the important attributes. 6. The detective looks at the clusters, smallest clusters first and then gives the expert recommendations. unsolved crimes can be clustered based on the significant attributes and the result is given to detectives for inspection
  • 50. STEP #3 ANALYZING PATTERNS AND DRAWING CONCLUSIONS
  • 52.
  • 53. ADVANTAGES OF Crime pattern DETECTION
  • 54. Learn from historical crime patterns and enhance crime resolution rate. Preempt future incidents by putting in place preventive mechanisms based on observed patterns. Reduce the training time for officers assigned to a new location and having no prior knowledge of site-specific crime patterns. Increase operational efficiency by optimally redeploying limited resources (like personnel, equipment, etc.) to the right place at the right time.
  • 55. LIMITATIONS OF CRIME PATTERN DETECTION
  • 56. Crime pattern analysis can only help the detective, not replace them Data mining is sensitive to quality of input data that may be inaccurate, have missing information, be data entry error prone Mapping real data to data mining attributes is not always an easy task and often requires skilled data miner and crime data analyst with good domain knowledge

Notes de l'éditeur

  1. People may simply want to ‘keep themselves to themselves’ for fear of harassmentGhetto - (a neighborhood populated by minorities)
  2. 3rd point -Some people seek acceptance from a particular group, and therefore act in a deviant manner
  3. The type of crime is robbery and it will be the most important attribute. The rows 1 and 3 show a simple crime pattern where the suspect description matches and victim profile is also similar.
  4. 4.for same word such as blank, unknown, or junk all meant the same for missing age of the person.5. This process involved talking to domain experts such as the crime detectives, the crime data analysts and iteratively running the attribute importancealgorithm to arrive at the set of attributes for the clustering the given crime types. We refer to this as the semi-supervised or expert-based paradigm of problem solving. Based on the nature of crime the different attributes become important such as the age group of victim is important for homicide, for burglary the same may not be as important since the burglar may not care about the age of the owner of the house.