Detection of Crime Using the Application of Regression Mechanism

Authors

  • Pathania M Department of Computer Science, SSCET, Pathankot, Punjab, India
  • Awasthi I Department of Computer Science, SSCET, Pathankot, Punjab, India

DOI:

https://doi.org/10.26438/ijcse/v7i10.265272

Keywords:

Crime detection, cloud computing, data mining, clustering, Internet of things

Abstract

Crime, an unlawful act, causes terror and threat to our society and is a major concern for national security. However, very negligible work has been done to develop models and methods to hold an active collaboration between forensic science and criminal investigation systems. The need is felt to develop a system that collects as well as categorise the data on crimes along with an analysis of crime affected areas identification. In this study, an efficient crime investigation system is proposed in which fuzzy rules and Regression clustering algorithm is employed to identify and detect crime affected region along with showing it on the map. The study of DATA GATHERING is incorporated for crime detection and prevention with an aim to provide a safer society to live.

References

[1] Q.Rossy, O.Ribaux, “ A collaborative approach for incorporating forensic data into crime investigation using criminal intelligence analysis and visualisation” Forensic Science and Justice, Vol. 54 , 2014 , pp. 146-153.

[2] Q.Rossy, S.Ioset, D. Dessimoz, and O. Ribaux, “Integrating forensic information in a crime intelligence database,” Forensic Sci. Int., vol. 230, no. 1–3, pp. 137–146, 2013.

[3] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing : state-of-the-art and research challenges,” pp. 7–18, 2010.

[4] S. H. Liao, P. H. Chu, and P. Y. Hsiao, “Data mining techniques and applications - A decade review from 2000 to 2011,” Expert Syst. Appl., vol. 39, no. 12, pp. 11303–11311, 2012.

[5] J. Han and M. Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2001.

[6] E. R. Groff and N. G. La Vigne, “Forecasting the Future of Predictive Crime Mapping,” Crime Prev. Stud., vol. 13, pp. 29–57, 2002.

[7] W. Gorr, A. Olligschlaeger, and Y. Thompson, “Short-term forecasting of crime,” Int. J. Forecast., vol. 19, no. 4, pp. 579–594, 2003.

[8] G. Oatley, “Crimes analysis software : ‘ Pins in Maps ’, clustering and Bayes net prediction, ” Expert Systems with Applications , vol. 25, no. March, pp. 569–588, 2016.

[9] T. H. Grubesic, “On the application of fuzzy clustering for crime hot spot detection,” J. Quant. Criminol., vol. 22, no. 1, pp. 77–105, 2006.

[10] S. V. Nath, “Crime Pattern Detection Using Data Mining,” Web Intell. Intell. Agent Technol. Work. 2006. WI-IAT 2006 Work. 2006 IEEE/WIC/ACM Int. Conf., vol. 1, no. 954, pp. 41–44,2006.

[11] K. Stoffel, P. Cotofrei, and D. Han, “Fuzzy Clustering based Methodology for Multidimensional Data Analysis in Computational Forensic Domain,” Itcf 2010, vol. 4, pp. 400–410, 2011.

[12] A. Juyal, O. Gupta, “A review on clustering techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, 2014.

[13] T.Moon, S.Heo, S.Lee, “Ubiquitous crime prevention system for a safer city”, Environmental Sciences, Vol. 22, pp. 288-301,2014.

[14] S. K. Sood, “Dynamic Resource Provisioning in Cloud based on Queuing Model,” vol. 2, no. 4, 2013.

[15] CASAGRAS, RFID and the inclusive model for the Internet of Things report, EU Project Number 216803, pp 16–23, 2011.

[16] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things ( Data gathering ): A vision , architectural elements , and future directions,” vol. 29, pp. 1645–1660, 2013.

[17] E. Borgia, “The Internet of Things vision : Key features , applications and open issues,” vol. 54, pp. 1–31, 2014.

[18] J. Byun, A. Nasridinov, Y. Park*," Internet of Things for Smart Crime Detection", Contemporary Engineering Sciences, Vol. 7, no. 15, pp.749 - 754, 2014.

[19] N. Dlodlo, P. Mbecke, M. Mofolo, and M. Mhlanga, “The internet of things in community safety and crime prevention for South Africa,” Innov. Adv. Comput. Informatics, Syst. Sci. Netw. Eng.,pp.531–537,2015.

[20] S. A. Alvi, B. Afzal, G. A. Shah, L. Atzori, and W. Mahmood, “Ad Hoc Networks Internet of multimedia things : Vision and challenges,” Ad Hoc Networks, vol. 33, pp. 87–111, 2015.

[21] V. Spicer, J. Song, P. Brantingham, A. Park, and M. A. Andresen, “Street pro fi le analysis : A new method for mapping crime on major roadways,” Appl. Geogr., vol. 69, pp. 65–74, 2016.

Downloads

Published

2019-10-31
CITATION
DOI: 10.26438/ijcse/v7i10.265272
Published: 2019-10-31

How to Cite

[1]
M. Pathania and I. Awasthi, “Detection of Crime Using the Application of Regression Mechanism”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 265–272, Oct. 2019.

Issue

Section

Research Article