Subhash Tatale 1, Sachin Sakhare 2 1,2, Computer Engg.,VIIT/ Pune, India)

Similar documents
Implementation of Data Mining for Vehicle Theft Detection using Android Application

An Efficient Clustering for Crime Analysis

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

CHAPTER 7 CONCLUSION AND FUTURE WORK

TIM 50 - Business Information Systems

Chapter 3. Foundations of Business Intelligence: Databases and Information Management

2.1 Ethics in an Information Society

Overview of Web Mining Techniques and its Application towards Web

TIM 50 - Business Information Systems

International Journal of Advance Engineering and Research Development. A Survey on Data Mining Methods and its Applications

A Comparative Study of Data Mining Process Models (KDD, CRISP-DM and SEMMA)

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 05, 2016 ISSN (online):

Question Bank. 4) It is the source of information later delivered to data marts.

A SURVEY ON WEB LOG MINING AND PATTERN PREDICTION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

In the recent past, the World Wide Web has been witnessing an. explosive growth. All the leading web search engines, namely, Google,

Web Data mining-a Research area in Web usage mining

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics

DATA MINING AND WAREHOUSING

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

An Overview of various methodologies used in Data set Preparation for Data mining Analysis

Gujarat Forensic Sciences University

Pre-processing of Web Logs for Mining World Wide Web Browsing Patterns

An Algorithm for user Identification for Web Usage Mining

Visualisation of Abstract Information

An Improved Document Clustering Approach Using Weighted K-Means Algorithm

Intelligence Led Policing: Enhancing Force Deployment in Law Enforcement and Counter-Terrorism Using Data & Visual Analytics

Database and Knowledge-Base Systems: Data Mining. Martin Ester

A Survey on Data Preprocessing Techniques for Bioinformatics and Web Usage Mining

INTRODUCTION. Chapter GENERAL

Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda

POLICE QUICK REPORTING SYSTEM (PQRS)

NORMALIZATION INDEXING BASED ENHANCED GROUPING K-MEAN ALGORITHM

The Data Mining usage in Production System Management

International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16

Data Marting Crime Correlations Using San Francisco Crime Open Data

Management Information Systems Review Questions. Chapter 6 Foundations of Business Intelligence: Databases and Information Management

DATA MINING II - 1DL460

Research and Application of Mobile Geographic Information Service Technology Based on JSP Chengtong GUO1, a, Yan YAO1,b

Data Mining. Ryan Benton Center for Advanced Computer Studies University of Louisiana at Lafayette Lafayette, La., USA.

A Survey On Different Text Clustering Techniques For Patent Analysis

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar

Data Mining Technology Based on Bayesian Network Structure Applied in Learning

SPECIAL ISSUE, PAPER ID: IJDCST-09 ISSN

Managing Data Resources

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

This tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining.

Analyzing Outlier Detection Techniques with Hybrid Method

KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW. Ana Azevedo and M.F. Santos

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

CLASSIFICATION FOR SCALING METHODS IN DATA MINING

WEB USAGE MINING: ANALYSIS DENSITY-BASED SPATIAL CLUSTERING OF APPLICATIONS WITH NOISE ALGORITHM

A Survey Of Issues And Challenges Associated With Clustering Algorithms

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

WKU-MIS-B10 Data Management: Warehousing, Analyzing, Mining, and Visualization. Management Information Systems

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

Obtaining Rough Set Approximation using MapReduce Technique in Data Mining

In-Memory Analytics with EXASOL and KNIME //

Data Mining. Data preprocessing. Hamid Beigy. Sharif University of Technology. Fall 1395

Data Mining. Data preprocessing. Hamid Beigy. Sharif University of Technology. Fall 1394

Intrusion Detection Using Data Mining Technique (Classification)

Chapter 6 VIDEO CASES

INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING

Data Mining of Web Access Logs Using Classification Techniques

Knowledge Discovery and Data Mining

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

Data Management Glossary

An Indian Journal FULL PAPER. Trade Science Inc. Research on data mining clustering algorithm in cloud computing environments ABSTRACT KEYWORDS

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

AN EFFECTIVE SEARCH ON WEB LOG FROM MOST POPULAR DOWNLOADED CONTENT

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City

SUMMERY, CONCLUSIONS AND FUTURE WORK

Natural Language to Database Interface

A PRAGMATIC ALGORITHMIC APPROACH AND PROPOSAL FOR WEB MINING

Privacy Protection in Personalized Web Search with User Profile

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Detection of Missing Values from Big Data of Self Adaptive Energy Systems

Data Warehousing. Ritham Vashisht, Sukhdeep Kaur and Shobti Saini

CE4031 and CZ4031 Database System Principles

A Survey And Comparative Analysis Of Data

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Q1) Describe business intelligence system development phases? (6 marks)

Software Architecture Recovery based on Dynamic Analysis

Trends in Mobile Forensics from Cellebrite

INTELLIGENT SUPERMARKET USING APRIORI

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Data Mining Course Overview

Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

Web Mining Evolution & Comparative Study with Data Mining

Domestic electricity consumption analysis using data mining techniques

Interactive Fluid Dynamics Visualization

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Data Mining in the Application of E-Commerce Website

Data Mining: Approach Towards The Accuracy Using Teradata!

Inferring User Search for Feedback Sessions

Field Series. Jump-start investigations with forensically sound data in real time.

Cse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University

Transcription:

Intellectual Crime Recognition System Subhash Tatale 1, Sachin Sakhare 2 1,2, Computer Engg.,VIIT/ Pune, India) ABSTRACT : In many countries the amount of crime incidents that is reported per day is increasing significantly. Concerning about India, the department of Police is the major organization of preventing crimes. In general, Indian police stations utilize paper-based information storing systems and they don't employ computer based applications up to a great coverage. Due to this utilization of paper-based systems police officers have to spend a lot of time as well as human resources to analyze existing crime information and to identify suspects for crime incidents. So the requirement of an efficient way for crime investigation has arisen. Business Intelligence practices are one aspect of crime investigation, for which numerous techniques are available. This paper highlights the use of business intelligence techniques, clustering and classification for effective investigation of crimes. Further the paper aims to identify suspects by analyzing existing evidences in situations where any witness or forensic clues are not present. Keywords -Business Intelligence, Classification, Clustering, Crime Identification, Data Mining I. INTRODUCTION It is very difficult to find a country which has a crime- free society. As long as human beings have feelings they bring round on attempting crimes. So the present society has also packed with various kinds of crimes. Conversely the criminals in today's society use various advanced technologies and give crimes in a really diplomatic ways. So that crime investigation has become a more complex process than early days[1]. The Police Department is responsible for enforcing criminal and traffic law, enhancing public safety, maintaining order and keeping the silence. Alternatively Crime investigation has very significant role of police system. With the increased complexity of crime investigation process police officers have to tolerate a lot of pressure than early days. The most incredible risk for the police department is investigating crimes with the current technologies, because they still use conventional instruction manual processes to handle crimes that are doing with the use of advanced technologies[2]. Therefore, police needs such a crime analysis tool to catch criminals and to remain ahead in the endless race between the criminals and the law enforcement. The police should use the current technologies to give themselves the much-needed perimeter. Availability of relevant and timely information is of extreme necessity in conducting of daily business and activities by the police, particularly in crime investigation and detection of criminals. Police organizations everywhere have been handling a large amount of such information and huge volume of records. There is an urgent need to analyzing the increasing number of crimes as approximately 18 lakhs Indian Penal Code (IPC) crime, and 39 lakhs local and Special Law crimes per year[3]. II. CHALLENGES AND APPROACH An ideal crime recognition system should be able to identify crime patterns quickly and in an efficient manner for future crime pattern detection and action. However, in the present scenario, the following major challenges are encountered[4]. 1. Increase in the size of crime information that has to be stored and analyzed. 2. Problem of identifying techniques that can accurately and efficiently analyze this increasing amount of crime data. 3. Different methods and structures used for recording crime data. 4. The data available is inconsistent and are incomplete thus making the task of formal analysis is a far more difficult. 5. Investigation of the crime takes longer duration due to complexity of issues. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 40 Page

All the above challenges motivated to focus on providing solutions that can enhance the process of crime identification and reducing crime in India. The main aim of this approach consist of developing analytical data mining methods that can systematically address the complex problem related to various form of crime[5]. Thus, the main focus is to develop a crime recognition system that assists the police in 1. Detecting crime patterns and performs crime analysis 2. Provide information to formulate strategies for crime prevention and reduction 3. Identify and analyze common crime patterns to reduce further occurrences of similar incidence III. DESIGN OF THE SYSTEM There are currently several methodologies for data mining which we can be used in many application fields. Data mining is a powerful tool that enables criminal investigators to cross-examine huge databases quickly and efficiently. The processing speed of computer aided applications range to several thousand code lines per second which helps to optimize time factor in such analysis. Data mining and decision support systems have a significant role to play in providing assistance to human assumption in this forensic field that creates one of the most challenging decision-making environments. Geographical information systems and social network analysis are utilizing data mining technologies for tasks like identification of crime networks, usage of matching semantics on crime and criminals and finally producing the results of confirmation of findings[6]. Fig. 1 The process model for data mining provides an overview of the life cycle of a data mining project. Data mining process model consists of six steps: 1. Business Understanding 2. Data Understanding 3. Data Preparation International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 41 Page

4. Modeling 5. Evaluation 6. Deployment The relationships between particular phases are illustrated on Figure 1. Data Mining is the process of extracting useful knowledge from data. Criminal Intelligence Application (CIP) is used in many ways for investigation of individual crimes, as well as criminal networks. The steps for crime investigation are also similar to steps for crime data mining. The police methodology for investigation uses case based interpretation techniques. From this viewpoint, all data sources used by the police can also be the source for crime data mining[7]. The crime investigation process therefore can be organized into the following five steps: 1. Collecting crime data, 2. Processing and storing crime data & documents, 3. Searching, retrieving, collecting additional information, 4. Analyzing information to find clues, 5. Using information to prosecute criminals. The present approach proposes the use of combination of data mining techniques that are linked with a common aim of developing such a crime recognition tool. Data preprocessing techniques are mainly used for producing high-quality mining results. Raw data are being preprocessed before mining because data are in different format, collected from various sources and stored in the data bases and data warehouses[8]. Major steps involved in data mining are data cleaning; data integration, data transformation and data reduction have shown in Figure 2. Data Cleaning Data Integration Raw Data 1. Fill in missingvalue. 2. Smoothing data Merging of data frommultiple datastorages. Mining Results Data miningprocess Data Reduction 1. Attribute subset selection. Data Transformation 1. Datanormalization. 2. Fig.2. Data preprocessing In the data cleaning step, omitted values will be filled, noisy data will be smoothened, outlier s data will be removed and incompatible data are determined. Data integration step undergoes integration of data. Data normalization and attribute construction are done in the data transformation for standardizing data. Attribute subsets are selected from large dataset and dimensionality has International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 42 Page

reduced. After preprocessing, finally standard data undergo the process of mining and hence better results have obtained. For this purpose, the following specific objectives were formulated[9]. 1. To develop a data cleaning algorithm that cleans the crime dataset, by removing redundant data. 2. Use techniques to fill omitted values in an well-organized manner. 3. To explore and enhance clustering algorithms to identify crime patterns from historical data. 4. To explore and enhance classification algorithms to predict future crime behavior based on previous crime trends. 5. To develop anomalies detection algorithms to identify change in crime patterns. IV. PROPOSED IMPLEMENTATION OF THE SYSTEM Crime Recognition Tool can be divided into several components in order to describe the system clearly. Fig. 3 shows those components and how they are interconnected within the system. 4.1 User interface The user interface is one of the most important parts of any program because it determines how easily a user can interact with the program. The purpose of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals. As a powerful program with a poorly designed user interface has very little value, the process of designing user interface must be done very carefully. User interface, which is one of the components in Crime Recognition Tool, consists of all the web pages of the system that are displayed to users through a web browser[10]. 4.2 MVC Architecture Model-View-Controller architecture is used for interactive web-applications. This model minimizes the coupling between business logic and data presentation to web user. This model divides the web based application into three layers. It is a hybrid approach for serving dynamic content.it combines the use of both Servlets and JSP. 4.2.1 Model Model domain contains the business logics and functions that manipulate the criminal record data. It provides updated information to view domain and also gives response to query. And the controller can access the functionality which is encapsulated in the model. 4.2.2 View View is responsible for presentation aspect of application according to the model data and also responsible to forward query response to the Servlet controller.as Java Server Pages (JSP) are used for the implementation of User Interfaces. User input validations, for example validating user id and password and displaying error messages when validations are failed were also easily implemented using JSP 2. 0. All the widgets in user interfaces such as input fields, buttons and menus were developed using JSP s. Ajax APIs has used to update the components when they have finished processing the algorithms. 4.2.3 Controller: Controller accepts and intercepts user requests and controls the business objects to fulfill these requests. An application has one controller for related functionality. Controller can also be depends on the type of clients. Though MVC comes in different flavors, the control flow generally works as follows: 1. The user interacts with the user interface in some way (e.g., user presses a button) 2. A controller handles the input event from the user interface, often via a registered handler or callback. 3. The controller accesses the model, possibly updating it in a way appropriate to the user s action (e.g., controller updates crime record). Complex controllers are often structured using the command pattern to encapsulate actions and simplify extension. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 43 Page

4. A view uses the model to generate an appropriate user interface (e.g., view produces a screen listing the crime contents). The view gets its own data from the model. The model has no direct knowledge of the view. (However, the observer pattern can be used to allow the model to indirectly notify interested parties, potentially including views, of a change.) 5. The user interface waits for further user interactions, which begins the cycle anew. 4.3 Database Database stores all the crime and criminal information as well as the patterns or the clusters of crime incidents. Moreover it stores the details of Crime Recognition Tool System s users as well.to implement the Oracle Database Express Edition can be used. After successfully creating the database we can configure the database connectivity of the application server (WebLogic Server) by configuring a JDBC data source and then deploying that JDBC resource to the application server [11]. Fig.3. MVC Architecture V. CONCLUSION In today s IT enabled era many techniques are available for crime prevention and investigation. This paper presents a methodology of recognizing a criminal record by using existing evidences in situations where any witness or forensic clues are not present. The system uses an unambiguous clustering mechanism to fragment crime data into subsets, or clusters based on the available evidences and classification techniques has used to recognize most possible suspect/ suspects for crime incidents. Data mining supports enhanced decision making and analysis, and is a powerful tool that can be used to address the large volume of crime information. Data mining practices is one aspect of crime investigation, for which numerous technique are available. The system has used the communication power of multi agent systems to increase the efficiency in identifying possible suspects. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 44 Page

References [1] Karel, JANEČKA, Hana, HŮLOVÁ, Using Spatial Data Mining to Discover the Hidden Rules in the Crime Data, GIS Ostrava 2011, 23. 26. 1. 2011, Ostrava [2] Malathi. A, Dr. S. Santhosh Baboo, An Enhanced Algorithm to Predict a Future Crime using Data Mining, International Journal of Computer Applications,(0975 8887)Volume 21 No.1, May 2011 [3] Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros and Joost N. Kok, Data Mining Approaches to Criminal Career Analysis,Leiden Institute of Advanced Computer Science (LIACS) [4] Sara Hajian, Josep Domingo-Ferrer and Antoni Mart ınez-ballest, Discrimination Prevention in Data Mining for Intrusion and Crime Detection,IEEE 2011. [5] Fatih OZGUL, Claus ATZENBECK, Ahmet CELIK, Zeki ERDEM, Incorporating data sources and methodologies for crime data mining, IEEE 201,176-180. [6] Chung-Hsien Yu1, Max W. Ward1, Melissa Morabito2, and Wei Ding1, Crime Forecasting Using Data Mining Techniques, 11th IEEE International Conference on Data Mining Workshops,IEEE 2011,779-786. [7] Revatthy Krishnamurthy, J. Satheesh Kumar, Survey of Data Mining Techniques on Crime Data Analysis, International Journal of Data Mining Techniques and Applications, December 2012,117-120. [8] Fang Jin, Wei Wang, Yi Xiao, Zhenhe Pan, Proposal of Crime Data Mining Project. [9] Prof. Hanmant N. Renushe, Prof. Prasanna R. Rasal, Prof. Abhijit S. Desai, Data Mining Practices for Effective Investigation of Crime, International Journal Computer Technology & Applications,2012, 865-870. [10] Devesh Bajpai, Emerging Trends in Utilization of Data Mining in Criminal Investigation: An Overview, Journal of Environmental Science, Computer Science and Engineering & Technology, June-August, 2012,124-131, [11] Kaumalee Bogahawatte, Shalinda Adikari, Intelligent Criminal Identification System, The 8th International Conference on Computer Science & Education (ICCSE 2013, April 26-28, 2013,633-638. International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 45 Page