International Journal of
Computer Sciences and Engineering

Scholarly Peer-Reviewed, and Fully Refereed Scientific Research Journal
Crime Data Mining an Indian Perspective
Crime Data Mining an Indian Perspective
N. Narwal1
1 Dept. of Computer Science, Maharaja Surajmal Institute (GGSIP University), New Delhi, India.
Correspondence should be addressed to: neetunarwal@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-8 , Page no. 71-78, Aug-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i8.7178

Online published on Aug 30, 2017

Copyright © N. Narwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation

IEEE Style Citation: N. Narwal, “Crime Data Mining an Indian Perspective”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.71-78, 2017.

MLA Style Citation: N. Narwal "Crime Data Mining an Indian Perspective." International Journal of Computer Sciences and Engineering 5.8 (2017): 71-78.

APA Style Citation: N. Narwal, (2017). Crime Data Mining an Indian Perspective. International Journal of Computer Sciences and Engineering, 5(8), 71-78.
Downloads (113)     Full view (121)
           
Abstract :
Today Information Technology is used in every domain of life. The traditional age-old system of intelligence and criminal record maintenance are no longer used in the current crime scenario. With the availability of spatial data related to crime can be used to integrate it with latest GPS system to highlight the location of crime and such indication can be used by people to be cautious and alert. This latest technology can be used as an aid to warn and guide people about such happening in the crime prone areas. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. This paper suggests methodology that combines the Geographical Information System with crime data to provide crime data mining.
Key-Words / Index Term :
Crime Mining, Geographical Information System, Hot Spots
References :
[1] D.E. Brown, "The regional crime analysis program (RECAP): A frame work for mining data to catch criminals”, In the Proceedings of 1998 IEEE International Conference on Systems, Man, and Cybernetics, Vol. 3, pp. 2848-2853, 1998.
[2] T. Abraham and O. de Vel, "Investigative profiling with computer forensic log data and association rules,", In the Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM`02), pp. 11 – 18, 2002.
[3] J.S. De Bruin, T.K. Cocx, W.A. Kosters, J. Laros and J.N. Kok, “Data mining approaches to criminal career analysis” in the Proceedings of the Sixth International Conference on Data Mining (ICDM’06), pp. 171-177, 2006.
[4] S.V. Nath, “Crime pattern detection using data mining,” in the Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 41-44, 2006.
[5] S. Lin, D. E. Brown, “An Outlier-based Data Association Method For Linking Criminal Incidents”, Decision Support System, Vol 41, Issue 3, pp. 604-615, 2006.
[6] J. Han and M. Kamber, “Data Mining: Concepts and Techniques,” Morgan Kaufmann publications,India, pp. 1-39, 2006.
[7] M. Gupta , B. Chandra and M. P. Gupta, “Crime Data Mining for Indian Police Information System”, Computer Society of India, pp. 389-397, 2008.
[8] C.P. Johnson, “Crime Mapping and Analysis Using GIS”, In the Conference of Geomatics in Electronics Governamce, 2000.
[9] G. Yu, S. Shao, B. Luo, “Mining Crime Data by using New Similarity Measure”, IEEE, 2008. In the Proceedings of the 2008, Second International Conference on Genetic and Evolutionary Computing, pp. 389-392, 2008.
[10] K. Leong, S. Chan, V. Ng, S. Shiu, “Introduction of STEM: Space Time Event Model for Crime Pattern Analysis”, Asian Journal of Information Technology,Vol 7 Issue 12, pp.516-523, 2008.