Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vinod Gendre, Neetish Kumar Chandrakar, Lalit Kumar P. Bhaiya, Virendra Kumar Swarnkar
DOI Link: https://doi.org/10.22214/ijraset.2022.44846
Certificate: View Certificate
Crime is a preeminent issue where the main concern has been worried by individual, the local area and government. Wrongdoing forecast utilizes past information and in the wake of investigating information, anticipate the future wrongdoing with area and time. In present days sequential criminal cases quickly happen so it is a provoking assignment to anticipate future wrongdoing precisely with better execution. Clustering different time series into similar groups is a challenging clustering task because each data point is an ordered sequence. The most common approach to time series clustering is to flatten the time series into a table, with a column for each time index (or aggregation of the series) and directly apply standard clustering algorithms like k-means. But this doesn’t always work well on Time Series Data. The paper focuses on combining the features of K-Means Clustering algorithm with Dynamic Time Wrapping Algorithm for efficient Crime prediction and analysis.
I. INTRODUCTION
A crime is an unlawful action for which a man can be punished by law. Wrongdoing against an individual is called individual wrongdoing like homicide, theft, and so forth Property related misconduct implies burglary of property. Wrongdoing examination is a law execution task which incorporates a coordinated investigation that perceives and decides the example of wrongdoing. The different procedures utilized for various violations have been talked about with a prologue to the concerned crime. The sorts of wrongdoing are as referenced beneath [1].
Crime analysis relates to the group of consistently, analytical operations that provides periodic data about crime patterns and trends correlations. Crime analysis based on its scope, analysis techniques and data is further categorized into various types [2]:
II. TECHNIQUES FOR CRIME PREDICTION
III. ARCHITECTURE OF BASIC CRIME PREDICTION SYSTEM
The engineering of the essential framework comprises of the accompanying stages [4]:
IV. RELATED WORK
As per [5] Crime records has been correctly recorded through the police for a long term and really these days, there was a flood of Open Crime Data and of programs or on line utility displaying wrongdoing measurements on maps, each through authentic reassets, for instance, from police UK, and unique reassets making use of comparable authority records. This paper researches unique methodologies and the rigors have been led making use of the SCIAMA High Performance Computer Cluster on the University of Portsmouth and the Weka programming. One greater paper [6] has attempted the exactness of characterization and expectation depending on numerous tests. In one greater paintings group [7] bunched violations depending on occasion a great deal of the time for the duration of numerous years. Information mining is applied to extensively as a long way as exam, exam and disclosure of examples for occasions of wrongdoing. Another calculation [8] Crime place of hobby expectation has these days been proposed. Wrongdoing place of hobby expectation affects beyond records to differentiate wrongdoing regions of hobby, or net-primarily based totally media records. A calculation portrayed in [10] depicted Generic calculation for forestalling fee card cheats. It changed into applied for similarly growing the registering value with time through making complicated frameworks. It should have a take a observe a deceitful alternate in slightly any second. The probability of distortion trades should anticipate now no longer lengthy later Mastercard trades and direction of motion of adversarial to coercion frameworks might be gotten to maintain banks from extraordinary mishaps and restrict dangers.[11] portrayed mystery Markov model. It confirmed the execution and ampleness of the gadget. It likewise exhibited the needfulness of taking the spending profile. The exactness of the framework changed into 80 %. [12] proposed Bayesian and Neural groups that deliver computational scholar which include of making ready set having thing and records for figuring out misrepresentation so it may appropriately set up the brand new records as extortion or now no longer. It is reasoned that each the technique may be applied for figuring out fraud.[13] tested close to unsightly fluffy c-implies calculation for research of fierce wrongdoing, harsh set and facts entropy. It changed into joined to overtake the restrict so it is able to manipulate the vulnerability, unclearness, and inadequacy. This calculation changed into applied for settling protecting facts.[14] mentioned ok-mode bunching and association rule mining calculation which have been applied to examine unique plan or instance of mishaps befell withinside the street.
In the wake of making use of the calculation EDS changed into made premise of month and hour to display the mishaps occurred.[15] tested piece thickness evaluation, strategic relapse and abnormal backwoods showing changed into applied to direct spatial and fleeting exam of sexual assault. Kernel thickness evaluation changed into applied to investigate the probability thickness factors of rapes over each day, week through week, and month to month time spans. They evolved time collection making use of strategic relapse, and arbitrary forest fashions to survey connection between`s point-regions of intercourse violations, weather conditions. These results display that rape is certain to occur near the houses of enrolled intercourse offenders.[16] proposed ok way grouping calculation which changed into applied for growing examples of records. Information have been accumulated and disseminated, 0.33 of proper records and distortion records facts have been used for making plans and ultimate facts have been used for determine and net wrongdoing disclosure. The accuracy of the proposed paintings changed into 94.75 % and it beneficially perceived the artificial tempo of of 5.28%.
V. PROBLEM IDENTIFICATION
Clustering is an unmonitored gaining knowledge of project wherein an set of rules organizations comparable facts factors with out any “floor truth” labels. Similarity among facts factors is measured with a distance metric, usually Euclidean distance. Clustering one-of-a-kind time collection into comparable organizations is a hard clustering project due to the fact every facts factor is an ordered sequence. The maximum not unusual place technique to time collection clustering is to flatten the time collection right into a table, with a column for on every occasion index (or aggregation of the collection) and at once practice fashionable clustering algorithms like k-approach.As proven below, this doesn`t constantly paintings well. Each subfigure within side the chart plots a cluster generated via way of means of k-approach clustering with Euclidian distance. The cluster centroids in crimson do now no longer seize the form of the collection..
VI. METHODOLOGY
The distance measures utilized in trendy clustering algorithms, consisting of Euclidean distance, are regularly now no longer suitable to time collection. A higher technique is to update the default distance degree with a metric for evaluating time collection, consisting of Dynamic Time Warping. Euclidean distance metric is mistaken for time collection? In short, it's miles invariant to time shifts, ignoring the time size of the data. If time collection are rather correlated, however one is shifted via way of means of even one time step, Euclidean distance could erroneously degree them as similarly apart. Dynamic Time Warping (DTW) is a method to degree similarity among temporal sequences that don't align precisely in time, speed, or length. Given collection X=(x?, …, x?) and collection Y=(y?, …, y?), the DTW distance from X to Y is formulated as the subsequent optimization problem:
DTW is calculated because the squared root of the sum of squared distances among every detail in X and its nearest factor in Y. Note that DTW(X, Y) ≠ DTW(Y, X). DTW compares every detail in collection X with every detail in collection Y (n x m comparisons). The comparison, d(x?, y?), is simply the easy subtraction x? — y?.Then for every x? in X, DTW selects the closest factor in Y for distance calculation..
In Fig.3 Euclidean distance metric matches points in two time series. According to Fig.2 and Fig three the collection are of various lengths.Unlike Euclidean matching, DTW is capable of examine every factor withinside the blue collection to a degree withinside the crimson collection.The k-approach clustering set of rules may be carried out to time collection with dynamic time warping with the subsequent modifications.
VII. RESULTS
Dataset Used : The crime analysis and prfediction was carried out using downloaded crime data in csv format and storing in MySql data. The crime csv data was downloaded from following sites:
MySQL is an open-supply relational database control gadget. As with different relational databases, MySQL shops statistics in tables made of rows and columns. Users can define, manipulate, control, and question statistics the use of Structured Query Language, greater generally referred to as SQL. A bendy and effective program, MySQL is the maximum famous open-supply database gadget withinside the world. As a part of the widely-used LAMP generation stack (which includes a Linux-primarily based totally running gadget, the Apache net server, a MySQL database, and PHP for processing), it`s used to save and retrieve statistics in a huge form of famous applications, websites, and services.
The methodology is implemented using Java Technology. Java is a popular programming language, created in 1995.It is owned by Oracle, and more than 3 billion devices run Java. Major features of Java are:
Performance : The performance was calculated on the basis of execution time. It was found that hybrid approach was taking lesser time and the clustering quality was almost similar.According to results obtained it is clearly shown that combining DTW with K-Means is more efficient in matching each point in data and also more efficient time wise.Overall accuracy obtained was around 85% as per clustering execution time calculation for around 1000 records
The wrong doing rate on the planet is extending now a days due to many reasons, for instance, increase in destitution, defilement, joblessness, etc. Assuming the wrongdoing has extended significant measures is taken by the police specialists to ponder why the wrongdoing rate has extended and besides how to diminish wrongdoing rate around there. The point of this paper is analyse the impact of combining the DTW algorithm with K-Means for efficient crime prediction and analysis. Analysis show that the hybrid approach out performs the purely K-Means algorithm based clustering approach. DTW has been applied to temporal sequences of video, audio and graphics data — indeed, any data that can be turned into a linear sequence can be analysed with DTW. Future work focuses on using DTW algorithm for analysing the different data like speech for criminal voice recognition.
[1] Krishnendu S.G, Lakshmi P.P, Nitha L, Crime Analysis and Prediction using Optimized K-Means Algorithm, Proceedings of the Fourth International Conference on Computing Methodologies and Communication (ICCMC 2020) IEEE Xplore Part Number:CFP20K25-ART; ISBN:978-1-7281-4889-2. [2] Neophytos Charalambides, Dimensionality Reduction for k-means Clustering, [cs.LG] 26 Jul 2020 [3] Ayidh alqahtani, Ajwani Garima, Ahmad Alaid, “Crime analysis in Chicago City”, in 10th IEEE International Conference on Information and Communication System (ICICS), 2019. [4] Jesia Quader Yuki, Md.Mahfil Quader Sakib, Zaisha Zamal, Khan Mohammad Habibullah, Amit Kumar Das “Predicting Crime Using Time and Location Data”, ICCCM 2019 Association for Computing Machinery. [5] Md Abu Saleh, Ihtiram Raza Khan, “Crime Data Analysis using K-Means clustering”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), April 2019, vol. 07, ISSUE.04. [6] RajKumar.S, Sakkarai Pandi.M, Crime Analysis and prediction using data mining techniques,International Journal of recent trends in engineering & research,2019. [7] Ayisheshim Almaw, Kalyani Kadam, Survey Paper on Crime Prediction using Ensemble Approach, International journal of Pure and Applied Mathematics,2018. [8] Dr .M.Sreedevi, A.Harha Vardhan Reddy, ch.Venkata Sai Krishna Reddy, Review on crime Analysis and prediction Using Data Mining Techniques, International Journal of Innovative Research in Science Engineering and technology ,2018. [9] Grzegorz Borowik, Zbigniew M. Wawrzyniak, Pawe? Cichosz, Time series analysis for crime forecasting,c 2018 European Union. [10] Alkesh Bharati, Dr Sarvanaguru RA.K ,”Crime Prediction andAnalysis using Machine Learning” In International Research Journal of Engineering and technology (IRJET), Vol no.05, pp. 2395-0072, 2018. [11] Hitesh Kumar Reddy ToppyiReddy, Bhavana Saini, Ginika mahajan, Crime Prediction &Monitoring Framework Based on Spatial Analysis, International Conference on Computational Intelligence Data Science (ICCIDS 2018). [12] Deepiika k.K, Smitha Vinod, Crime analysis in india using data minig techniques , International journal of Enginnering and technology, 2018. [13] P. Cichosz, Z. M. Wawrzyniak, R. Pytlak, G. Borowik, E. Szczechla,P. Michalak, D. Ircha, W. Olszewski, and E. Perkowski, “The utility of point of interest data for crime risk prediction,” in ITISE 2018 International Conference on Time Series and Forecasting – Proceedings of Papers, September 2018, pp. 1166–1177. [14] M. Feng, J. Zheng, Y. Han, J. Ren, and Q. Liu, “Big data analytics and mining for crime data analysis, visualization and prediction,” in Advances in Brain Inspired Cognitive Systems, J. Ren, A. Hussain,J. Zheng, C.-L. Liu, B. Luo, H. Zhao, and X. Zhao, Eds. Cham:Springer International Publishing, 2018, pp. 605–614. [15] R. Garg, A. Malik, and G. Raj, “A Comprehensive Analysis for Crime Prediction in Smart City Using R Programming,” in 2018 8th International Conference on Cloud Computing, Data Science Engineering (Confluence), Jan 2018, pp. 14–15. [16] F. Ahmad, S. Syal, and M. Tinna, “Criminal policing using Rossmo’sequation by applying local crime sentiment,” in Data Engineering and Intelligent Computing, S. Satapathy, V. Bhateja, K. Raju, and B. Janakiramaiah, Eds. Singapore: Springer, 2018, pp. 627–637. [17] G. Borowik, Z. M. Wawrzyniak, P. Cichosz, R. Pytlak, E. Szczechla,P. Michalak, D. Ircha, and W. Olszewski, “Prediction of crime from time series data-driven model,” in ITISE 2018 International Conference on Time Series and Forecasting – Proceedings of Papers, September 2018,pp. 1554–1564. [18] C. Catlett, E. Cesario, D. Talia, and A. Vinci, “A Data-Driven Approach for Spatio-Temporal Crime Predictions in Smart Cities,” in 2018 IEEE International Conference on Smart Computing (SMARTCOMP), June 2018, pp. 17–24. [19] AdelAli Alkhaibari , Ping-Tsai Chung, Ping-Tsai Chung, “Cluster Analysis for Reducing City Crime Rates”, in LongIsland Systems, Applications and Technology Conference (LISAT), 2017. [20] B. Ho?yst, Prognozowanie kryminologiczne w wymiarze spo?ecznym –Metodologia, Analiza, Tendencje rozwojowe. Wydawnictwo Naukowe PWN S.A., 2017, vol. 1, (in Polish). [21] H. Kang and H. Kang, “Prediction of crime occurrence from multimodal data using deep learning,” PloS one, vol. 12, no. 4, p. e0176244,2017. [22] Lalitha Saroja Thota, Suresh Babu Changlasetty, “Cluster based Zoning ofCrime Info”, IEEE International Conference on Security and Privacy in Computing and Communications (Trust Com), 2017. [23] Sunil Yadav,Meet Timbadia, Nikhilesh Yadav, Rohit Vishwakarma. “Crime Pattern Detection, Analysis and Prediction”, In International Conference on Electronics, Communication and Aerospace Technology, 2017. [24] Anand Joshi, A.Sai Sabitha, Tanupriya Chaudary, “Crime Analysis using k-mean Clustering”, InInternational Conference on Computational Intelligence and Networks, IEEE, Vol. 18, No. 3, March 2017. [25] Benjamin Fredrick David, A.Suruliandi, “A Survey on Crime Analysis and Prediction using Data Mining” Techniques”, ICTACT Journal on Soft Computing, April 2017 vol. 07, ISSUE.03. [26] H. Benjamin Fredrick David1,A. Suruliandi: Survey on crime analysis and prediction using data mining techniques.Department of Computer Science and Engineering,Manonmaniam Sundaranar University, India.Ictact journal on soft computing, april(2017). [27] K.S.N .Murthy, A.V.S.Pavan kumar, Gangu Dharmaraju, international journal of engineering, Science and mathematics, 2017. [28] Ginger Saltos and Mihaela Coacea, An Exploration of Crime prediction Using Data Mining on Open Data, International journal of Information technology & Decision Making,2017.
Copyright © 2022 Vinod Gendre, Neetish Kumar Chandrakar, Lalit Kumar P. Bhaiya, Virendra Kumar Swarnkar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44846
Publish Date : 2022-06-25
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here