Open Access   Article Go Back

Crime Intelligent Security Control Robot Investigation System

M. Chandran1 , B. Vinothramkumar2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-08 , Page no. 114-124, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si8.114124

Online published on Oct 31, 2018

Copyright © M. Chandran, B. Vinothramkumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Chandran, B. Vinothramkumar, “Crime Intelligent Security Control Robot Investigation System,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.08, pp.114-124, 2018.

MLA Style Citation: M. Chandran, B. Vinothramkumar "Crime Intelligent Security Control Robot Investigation System." International Journal of Computer Sciences and Engineering 06.08 (2018): 114-124.

APA Style Citation: M. Chandran, B. Vinothramkumar, (2018). Crime Intelligent Security Control Robot Investigation System. International Journal of Computer Sciences and Engineering, 06(08), 114-124.

BibTex Style Citation:
@article{Chandran_2018,
author = {M. Chandran, B. Vinothramkumar},
title = {Crime Intelligent Security Control Robot Investigation System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {06},
Issue = {08},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {114-124},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=486},
doi = {https://doi.org/10.26438/ijcse/v6i8.114124}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.114124}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=486
TI - Crime Intelligent Security Control Robot Investigation System
T2 - International Journal of Computer Sciences and Engineering
AU - M. Chandran, B. Vinothramkumar
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 114-124
IS - 08
VL - 06
SN - 2347-2693
ER -

           

Abstract

This researching Fingerprint based identification is one of the most mature & proven technique compared to the biometric technique. Fingerprints are classified as rolled, plain & latent fingerprints. However, even today, a fully automated latent fingerprint matching system has not been developed. However, even today, a fully automated latent fingerprint matching system has not been developed. Matching latent fingerprints over rolled or plain fingerprints is difficult task. The reason behind this is nothing but presence of noise and non-linear distortion in latent prints. Matching latent fingerprints over rolled or plain fingerprints is difficult task. An CIESs should be designed as a criminal investigation decision support system (CIDSS), a reasoning process based on production rules. we using image processing tool box for identify the criminals finger print ,If one decides to use only one year of crime data for detailed analysis then an analyst must spend 1.5 million minutes. As Per Regional Crime Analysis Program (RECAP), If one decides to use crime data for detailed analysis then an analyst.

Key-Words / Index Term

We also implemented a Pass Matrix prototype on Android and carried out real user we identify the criminals within short period using finger print scanner, If we found new finger print, we will add the finger print register immediately as well as matching finger print to some criminal, This method is used to identify the vehicles easily

References

[1] Artificial Intelligence and Expert System, Bejing: National Defence Science and Technology Press. 2015, pp..210-218.
[2] Analysis of the Causes and effects of Crimes, Collection of Researches on Criminal investigation, Bejing: Mass press, 2017, pp.54-58.
[3] "Automatic, Rapid Generation of Design Prototypes from Logic Specifications," r national Journal of Software Engineering and Knowledge Engineering, Vol. 1, No. 4, 2013, pp.331-350.
[4] On the Construction of Quantitative Criminology, Journal of Police Academy. 2012, pp.1-5.
[5] Dill D.L., Mercuri R., Neumann P.G., and Wallach D.S., “Frequently Asked Questions about DRE Artificial Intelligence”, Feb.2012.