Open Access   Article Go Back

Detection of Crime Using the Application of Regression Mechanism

Minakshi Pathania1 , Isha Awasthi2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 265-272, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.265272

Online published on Oct 31, 2019

Copyright © Minakshi Pathania, Isha Awasthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Minakshi Pathania, Isha Awasthi, “Detection of Crime Using the Application of Regression Mechanism,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.265-272, 2019.

MLA Style Citation: Minakshi Pathania, Isha Awasthi "Detection of Crime Using the Application of Regression Mechanism." International Journal of Computer Sciences and Engineering 7.10 (2019): 265-272.

APA Style Citation: Minakshi Pathania, Isha Awasthi, (2019). Detection of Crime Using the Application of Regression Mechanism. International Journal of Computer Sciences and Engineering, 7(10), 265-272.

BibTex Style Citation:
@article{Pathania_2019,
author = {Minakshi Pathania, Isha Awasthi},
title = {Detection of Crime Using the Application of Regression Mechanism},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {265-272},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4934},
doi = {https://doi.org/10.26438/ijcse/v7i10.265272}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.265272}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4934
TI - Detection of Crime Using the Application of Regression Mechanism
T2 - International Journal of Computer Sciences and Engineering
AU - Minakshi Pathania, Isha Awasthi
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 265-272
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
287 290 downloads 162 downloads
  
  
           

Abstract

Crime, an unlawful act, causes terror and threat to our society and is a major concern for national security. However, very negligible work has been done to develop models and methods to hold an active collaboration between forensic science and criminal investigation systems. The need is felt to develop a system that collects as well as categorise the data on crimes along with an analysis of crime affected areas identification. In this study, an efficient crime investigation system is proposed in which fuzzy rules and Regression clustering algorithm is employed to identify and detect crime affected region along with showing it on the map. The study of DATA GATHERING is incorporated for crime detection and prevention with an aim to provide a safer society to live

Key-Words / Index Term

Crime detection, cloud computing, data mining, clustering, Internet of things

References

[1] Q.Rossy, O.Ribaux, “ A collaborative approach for incorporating forensic data into crime investigation using criminal intelligence analysis and visualisation” Forensic Science and Justice, Vol. 54 , 2014 , pp. 146-153.
[2] Q.Rossy, S.Ioset, D. Dessimoz, and O. Ribaux, “Integrating forensic information in a crime intelligence database,” Forensic Sci. Int., vol. 230, no. 1–3, pp. 137–146, 2013.
[3] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing : state-of-the-art and research challenges,” pp. 7–18, 2010.
[4] S. H. Liao, P. H. Chu, and P. Y. Hsiao, “Data mining techniques and applications - A decade review from 2000 to 2011,” Expert Syst. Appl., vol. 39, no. 12, pp. 11303–11311, 2012.
[5] J. Han and M. Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2001.
[6] E. R. Groff and N. G. La Vigne, “Forecasting the Future of Predictive Crime Mapping,” Crime Prev. Stud., vol. 13, pp. 29–57, 2002.
[7] W. Gorr, A. Olligschlaeger, and Y. Thompson, “Short-term forecasting of crime,” Int. J. Forecast., vol. 19, no. 4, pp. 579–594, 2003.
[8] G. Oatley, “Crimes analysis software : ‘ Pins in Maps ’, clustering and Bayes net prediction, ” Expert Systems with Applications , vol. 25, no. March, pp. 569–588, 2016.
[9] T. H. Grubesic, “On the application of fuzzy clustering for crime hot spot detection,” J. Quant. Criminol., vol. 22, no. 1, pp. 77–105, 2006.
[10] S. V. Nath, “Crime Pattern Detection Using Data Mining,” Web Intell. Intell. Agent Technol. Work. 2006. WI-IAT 2006 Work. 2006 IEEE/WIC/ACM Int. Conf., vol. 1, no. 954, pp. 41–44,2006.
[11] K. Stoffel, P. Cotofrei, and D. Han, “Fuzzy Clustering based Methodology for Multidimensional Data Analysis in Computational Forensic Domain,” Itcf 2010, vol. 4, pp. 400–410, 2011.
[12] A. Juyal, O. Gupta, “A review on clustering techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, 2014.
[13] T.Moon, S.Heo, S.Lee, “Ubiquitous crime prevention system for a safer city”, Environmental Sciences, Vol. 22, pp. 288-301,2014.
[14] S. K. Sood, “Dynamic Resource Provisioning in Cloud based on Queuing Model,” vol. 2, no. 4, 2013.
[15] CASAGRAS, RFID and the inclusive model for the Internet of Things report, EU Project Number 216803, pp 16–23, 2011.
[16] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things ( Data gathering ): A vision , architectural elements , and future directions,” vol. 29, pp. 1645–1660, 2013.
[17] E. Borgia, “The Internet of Things vision : Key features , applications and open issues,” vol. 54, pp. 1–31, 2014.
[18] J. Byun, A. Nasridinov, Y. Park*," Internet of Things for Smart Crime Detection", Contemporary Engineering Sciences, Vol. 7, no. 15, pp.749 - 754, 2014.
[19] N. Dlodlo, P. Mbecke, M. Mofolo, and M. Mhlanga, “The internet of things in community safety and crime prevention for South Africa,” Innov. Adv. Comput. Informatics, Syst. Sci. Netw. Eng.,pp.531–537,2015.
[20] S. A. Alvi, B. Afzal, G. A. Shah, L. Atzori, and W. Mahmood, “Ad Hoc Networks Internet of multimedia things : Vision and challenges,” Ad Hoc Networks, vol. 33, pp. 87–111, 2015.
[21] V. Spicer, J. Song, P. Brantingham, A. Park, and M. A. Andresen, “Street pro fi le analysis : A new method for mapping crime on major roadways,” Appl. Geogr., vol. 69, pp. 65–74, 2016.