Open Access   Article Go Back

Prevention of Harassment of Women by Crime Detection, Analysis and Prediction

Bhavana M S1 , Bindu B K2 , Bindushree K3 , Chethana D N4 , Kiran Mensinkai5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 1-5, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.15

Online published on May 16, 2019

Copyright © Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai, “Prevention of Harassment of Women by Crime Detection, Analysis and Prediction,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.1-5, 2019.

MLA Style Citation: Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai "Prevention of Harassment of Women by Crime Detection, Analysis and Prediction." International Journal of Computer Sciences and Engineering 07.15 (2019): 1-5.

APA Style Citation: Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai, (2019). Prevention of Harassment of Women by Crime Detection, Analysis and Prediction. International Journal of Computer Sciences and Engineering, 07(15), 1-5.

BibTex Style Citation:
@article{S_2019,
author = {Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai},
title = {Prevention of Harassment of Women by Crime Detection, Analysis and Prediction},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1-5},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1190},
doi = {https://doi.org/10.26438/ijcse/v7i15.15}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.15}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1190
TI - Prevention of Harassment of Women by Crime Detection, Analysis and Prediction
T2 - International Journal of Computer Sciences and Engineering
AU - Bhavana M S, Bindu B K, Bindushree K, Chethana D N, Kiran Mensinkai
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Sexual harassment in public places is overwhelmingly experienced by women and girls. Sexual harassment is, in fact, the most common form of violence against women and girls and that young women are particularly targeted. Sexual harassment has significant and widespread impacts, both on individuals as well as on society. Sexual harassment in public reduces women and girls’ freedom to enjoy public life, and can negatively affect feelings of safety, bodily autonomy and mental health.This project proposes a data-driven method to analyze crime data and behavioral patterns using machine learning algorithms and thus predict emerging crime hotspots for additional police attention.Each community has different crime trends in different areas. These trends are analyzed using machine learning principles which help to predict how crimes against women have significantly increased in various areas of a community. It also helps in rapid visualization and identification of communities which are densely affected with crimes. This approach proves to be quite effective and can also be used for analyzing national crime scenario.

Key-Words / Index Term

K-means Clustering, Random Forest, Google maps GPS, stemming

References

[1] Mehedee Hassan, Mohammad Zahidur Rahman, “CrimeNews Analysis: Location and Story Detection”,2017 20th International Conference of Computerand Information Technology (ICCIT)
[2] R. Arulanandam, B. T. R. Savarimuthu, and M. A.Purvis, “Extracting crime information from online newspaper articles,” in Proceedings of the Second Australasian Web Conference - Volume 155,AWC ’14, (Darlinghurst, Australia, Australia), pp. 31–38, Australian Computer Society, Inc., 2014.
[3] I. Jayaweera, C. Sajeewa, S. Liyanage, T. Wijewardane, I. Perera, and A. Wijayasiri, “Crime analytics: Analysis of crimes through newspaper articles,” in 2015 Moratuwa Engineering Research Conference (MERCon), pp. 277–282, April 2015.
[4] P. Chamikara, D. Yapa, R. Kodituwakku and J. Gunathilake, “SLSecureNet : intelligent policing using data mining techniques”, International Journal of Soft Computing and Engineering, vol. 2, no. 1, pp. 175-180, 2012.
[5] S. Adhikari and K. Bogahawatte, “Intelligent criminal identification system,” in The 8th International Conference on Computer Science & Education, Colombo, Sri Lanka, 2013, pp. 633-638.
[6] M. Choi, “A selective sampling method for imbalanced data learning on support vector machines,”, 2010.
[7] K.B.S. Al-Janabi, “A Proposed Framework for Analyzing Crime Data Set using Decision Tree and Simple K-Means Mining Algorithm,” in Journal of Kufa for Mathematics and Computer, Vol. 1, No. 3, 2011, pp.8-24.
[8] K. Zhu and J. Zhang, “Predicting the potential locations of the next crime based on data mining,” in International Journal of Digital Content Technology and Its Application, Vol. 6, No. 20, 2012, pp. 574-581.
[9] A. Bogomolov, B. Lepri, J. Staiano, N. Oliver, F. Pianesi and A. Pentland, “Once upon a crime: towards crime prediction from demographics and mobile data,” in Proceedings of the 16th international conference on multimodal interaction, 2014, pp. 427-434.
[10] U. Thongsatapornwatana, “A survey of data mining techniques for analyzing crime patterns,” in 2nd Asian Conference on Defence Technology (ACDT), Jan 2016, pp. 123–128.
[11] G. Yu, S. Shao, and B. Luo, “Mining crime data by using new similarity measure,” in Second International Conference on Genetic and Evolutionary Computing, Sept 2008, pp. 389–392.
[12] Punetha, D.; Mehta, V. “Protection of the child/ elderly/ disabled/ pet by smart and intelligent GSM and GPS based automatic tracking and alert system” ,Advances in Computing,Communications and Informatics (ICACCI, 2014 InternationalConference on Year: 2014 pg2349 – 2354
[13] Bingbing Lu, Huaping Zhang, Bin Liu1, Zhonghua Zhao, “Research on UseR Identification Algorithm Based on Massive Multi-site VPN Log”, 2017 17th IEEE International Conference on Communication Technology
[14] Ubon Thansatapornwatana, A Survey of Data Mining Techniques For Analyzing Crime Patterns Second Asian Conference onDefense Technology ACDT, IEEE, 2016, ISBN: 978-1-5090-2258-8/16
[15] http://r-statistics.co/Linear-Regression.html.
[16] Machine Learning Tool Kit [Online]. Available: https://github. com/yinlou/mltk
[17] Amazon.com, Inc. (2012) Form 10-K for 2011. Filing date: February 1, 2012. U.S. Securities and Exchange Commission,Washington,DC.
[18] Cattani K, Gilland W, Heese H, Swaminathan J (2006) Boiling frogs: Pricing strategies for a manufacturer adding a direct channel that competes with the traditional channel. Production Oper. Management 15(1):40–56.
[19] Forrester Research, Inc. (2014b) European online retail forecast: 2013 to 2018. Report, May 29. Forrester Research, Inc., Cambridge, MA.
[20] Gans N, van Ryzin G (1999) Dynamic vehicle dispatching: Optimal heavy traffic performance and practical insights. Oper. Res. 47(5):675–692.
[21] Kaplan A (1969) Stock rationing. Management Sci. 15(5):260–267.
[22] Lee H (1987) A multi-echelon inventory model for repairable items with emergency lateral transshipments. Management Sci. 33(10):1302–1316.