Crime Prediction on Open Data in India Using Data Mining Techniques

被引:0
作者
Menaka, M. [1 ]
Sujatha, P. [1 ]
机构
[1] Vels Inst Sci Technol & Adv Studies Chennai, Dept Comp Sci, Chennai, Tamil Nadu, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Crime prediction; open data; data mining; decision tree; regression; classification; machine learning; crime analysis; predictive modeling; algorithm evaluation;
D O I
10.1109/ACCAI61061.2024.10601829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth in crime data collection necessitates a deeper theoretical understanding to support practical crime prevention strategies tailored to specific locations and times. Models for forecasting the frequency of various sorts of crimes under an administrative structure of regions utilized by the Indian police, as well as the frequency of anti-social behavior offenses, are investigated in this study. Four algorithms from several techniques are employed. The information is sourced from the Indian police and encompasses over 200,000 records before preprocessing. Based on predictive performance and processing time, the results indicate that SVM may be utilized to forecast crime frequency.Additionally, an ensemble of data mining classification approaches is employed to anticipate crime. Finally, the optimal forecasting technique for achieving the most stable results is presented. The study yields a model that utilizes implicit and explicit data mining approaches to produce credible crime predictions.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Almanie T, 2015, International Journal of Data Mining & Knowledge Management Process, V5, P01, DOI [10.5121/ijdkp.2015.5401, 10.5121/ijdkp.2015.5401, DOI 10.5121/IJDKP.2015.5401, 10.5121/ijdkp.2015]
[2]  
Anselin L., 1999, Geographical Information Systems: Principles, techniques, management and applications, DOI DOI 10.1073/PNAS.0801201105
[3]  
Azeez J, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1701, DOI 10.1109/ICACCI.2015.7275858
[4]  
Chen P., 2010, IEEE 2 INT C INF SCI
[5]  
Chung-Hsien Yu, 2011, 2011 IEEE International Conference on Data Mining Workshops, P779, DOI 10.1109/ICDMW.2011.56
[6]  
David H. Benjamin Fredrick, 2017, ICTACT Journal on Soft Computing, V7, P1459, DOI [10.21917/ijsc.2017.0202, 10.21917/ijsc.2017.0202]
[7]  
Deshmukh Atharva, 2020, 2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA). Proceedings, P120, DOI 10.1109/CSCITA47329.2020.9137772
[8]  
Huang YY, 2015, WIRELESS OPTIC COMM, P185, DOI 10.1109/WOCC.2015.7346202
[9]  
Iqbal Rizwan., 2013, INDIAN J SCI TECHNOL, V6, P4219, DOI DOI 10.17485/IJST/2013/V6I3.6
[10]  
Kiani Rasoul, 2015, International Journal of Advanced Research in Artificial Intelligence, V4, P11, DOI 10.14569/ijarai.2015.040802