Open Access   Article Go Back

Analysis of Crime Detection using Data Mining Techniques

P. Dineshkumar1 , B. Subramani2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 273-279, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.273279

Online published on Oct 31, 2019

Copyright © P. Dineshkumar, B. Subramani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Dineshkumar, B. Subramani, “Analysis of Crime Detection using Data Mining Techniques,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.273-279, 2019.

MLA Style Citation: P. Dineshkumar, B. Subramani "Analysis of Crime Detection using Data Mining Techniques." International Journal of Computer Sciences and Engineering 7.10 (2019): 273-279.

APA Style Citation: P. Dineshkumar, B. Subramani, (2019). Analysis of Crime Detection using Data Mining Techniques. International Journal of Computer Sciences and Engineering, 7(10), 273-279.

BibTex Style Citation:
@article{Dineshkumar_2019,
author = {P. Dineshkumar, B. Subramani},
title = {Analysis of Crime Detection using Data Mining Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {273-279},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4935},
doi = {https://doi.org/10.26438/ijcse/v7i10.273279}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.273279}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4935
TI - Analysis of Crime Detection using Data Mining Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - P. Dineshkumar, B. Subramani
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 273-279
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
297 225 downloads 139 downloads
  
  
           

Abstract

The In recent years the data mining is data analysing techniques that used to analyze crime data previously stored from various sources to find patterns and trends in crimes. Data Mining is the procedure which includes evaluating and examining large pre-existing databases in order to generate new information which may be essential to the organization. The extraction of new information is predicted using the existing datasets. Many approaches for analysis and prediction in data mining had been performed. But, many few efforts has made in the criminology field. In additional, it can be applied to increase efficiency in solving the crimes faster and also can be applied to automatically notify the crimes. However, there are many data mining techniques. In order to increase efficiency of crime detection, it is necessary to select the data mining techniques suitably. This paper reviews the literatures on various data mining applications, especially applications that applied to solve the crimes. Survey also throws light on research gaps and challenges of crime data mining. In additional to that, this paper provides insight about the data mining for finding the patterns and trends in crime to be used appropriately and to be a help for beginners in the research of crime data mining.

Key-Words / Index Term

Data mining; crime analysis, crime detection, criminology; Data analysis

References

[1] S. Sathyadevan, M. Devan, and S. Surya Gangadharan, “Crime analysis and prediction using data mining,” in Networks Soft Computing (ICNSC), 2014 First International Conference on, Aug 2014, pp. 406– 412.
[2] T. Pang-Ning, S. Michael, and K. Vipin, Introduction to Data Mining, 1st ed. Pearson, 5 2005.
[3] S. Kaza, Y. Wang, and H. Chen, “Suspect vehicle identification for border safety with modified mutual information,” in Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ser. ISI’06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 308–318.
[4] V. Vaithiyanathan, K. Rajeswari, R. Phalnikar, and S. Tonge, “Improved apriori algorithm based on selection criterion,” in Computational Intelligence Computing Research (ICCIC), 2012 IEEE International Conference on, Dec 2012, pp. 1–4.
[5] C. Chu-xiang, S. Jian-jing, C. Bing, S. Chang-xing, and W. Yun-cheng, “An improvement apriori arithmetic based on rough set theory,” in Circuits, Communications and System (PACCS), 2011 Third Pacific- Asia Conference on, July 2011, pp. 1–3.
[6] S. Kaza, T.Wang, H. Gowda, and H. Chen, “Target vehicle identification for border safety using mutual information,” in Intelligent Transportation Systems, 2005. Proceedings. 2005 IEEE, Sept 2005, pp. 1141–1146.
[7] W. Huang, M. Krneta, L. Lin, and J. Wu, “Association bundle – a new pattern for association analysis,” in Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on, Dec 2006, pp. 601–605.
[8] N. Sasaki, R. Nishimura, and Y. Suzuki, “Audio watermarking based on association analysis,” in Signal Processing, 2006 8th International Conference on, vol. 4, Nov 2006.
[9] A. Ben Ayed, M. Ben Halima, and A. Alimi, “Survey on clustering methods: Towards fuzzy clustering for big data,” in Soft Computing and Pattern Recognition (SoCPaR), 2014 6th International Conference of, Aug 2014, pp. 331–336.
[10] A. Thammano and P. Kesisung, “Enhancing k-means algorithm for solving classification problems,” in Mechatronics and Automation (ICMA), 2013 IEEE International Conference on, Aug 2013, pp. 1652–1656.
[11] Y. Zhao and G. Karypis, “Evaluation of hierarchical clustering algorithms for document datasets,” in Proceedings of the Eleventh International Conference on Information and Knowledge Management, ser. CIKM ’02. New York, NY, USA: ACM, 2002, pp. 515–524. [Online]. Available: http://doi.acm.org/10.1145/584792.584877
[12] C.-N. Hsu, H.-S. Huang, and B.-H. Yang, “Global and component wise extrapolation for accelerating data mining from large incomplete data sets with the em algorithm,” in Data Mining, 2006. ICDM ’06. Sixth International Conference on, Dec 2006, pp. 265–274.
[13] X.-M. Zhao, Y. ming Cheung, and D.-S. Huang, “Microarray data analysis using rival penalized em algorithm in normal mixture models,” in VLSI Design and Video Technology, 2005. Proceedings of 2005 IEEE International Workshop on, May 2005, pp. 129–132.
[14] H. Chen, W. Chung, Y. Qin, M. Chau, J. J. Xu, G. Wang, R. Zheng, and H. Atabakhsh, “Crime data mining: An overview and case studies,” in Proceedings of the 2003 Annual National Conference on Digital Government Research, ser. dg.o ’03. Digital Government Society of North America, 2003, pp. 1–5. [Online]. Available: http://dl.acm.org/citation.cfm?id=1123196.1123231
[15] R. Marikhu, J. Moonrinta, M. Ekpanyapong, M. Dailey, and S. Siddhichai, “Police eyes: Real world automated detection of traffic violations,” in Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on, May 2013, pp. 1–6.
[16] W. Cheng, X. Ji, C. Han, and J. Xi, “The mining method of the road traffic illegal data based on rough sets and association rules,” in Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, vol. 3, May 2010, pp. 856–859.
[17] U. Thongsatapornwatana and C. Chuenmanus, “Suspect vehicle detection using vehicle reputation with association analysis concept,” in Tourism Informatics, ser. Intelligent Systems Reference Library, T. Matsuo, K. Hashimoto, and H. Iwamoto, Eds., vol. 90. Springer Berlin Heidelberg, 2015, pp. 151–164.
[18] A. Kondaveeti, G. Runger, H. Liu, and J. Rowe, “Extracting geographic knowledge from sensor intervention data using spatial association rules,” in Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2011 IEEE International Conference on, June 2011, pp. 127–130.
[19] C.-H. Yu, M. Ward, M. Morabito, and W. Ding, “Crime forecasting using data mining techniques,” in Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, Dec 2011, pp. 779–786.
[20] G. Yu, S. Shao, and B. Luo, “Mining crime data by using new similarity measure,” in Genetic and Evolutionary Computing, 2008. WGEC ’08. Second International Conference on, Sept 2008, pp. 389–392.