Using Mapreduce Techniques to Predict and Examine Crime Pattern

  • Authors

    • Anushka Kumar
    • Vishnudas S
    • R Kayalvizhi
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.15860
  • Crime, data mining, crime patterns, Hadoop.
  • The evolution of computer structures and networks has created an alternative set for crook acts, extensively known as the crime. Crime incidents occurrences of specific criminal offenses lead to a heavy risk to the world economy, protection, and well-being of society. This paper provides complete information of crime incidents and their corresponding offenses combining a sequence of strategies in line with the appropriate literature. Initially, this paper evaluates and identifies the alternatives to crime incidents, their individual components and proposes a combinatorial incident-description schema. The schema offers the chance to systematically blend various elements or crime traits. Moreover, a complete listing of crime-associated offenses is provided in this paper. So, to increase the performance of crime detection, it is essential to choose the data mining strategies appropriately. Hadoop enables to solve the crime as a radical expertise of the repetition and underlying criminal activities. Using Hadoop, we can locate the specific city and analyze the crime patterns, based on that give preventive measures to people.

     

     

  • References

    1. [1] H. Chen, W. Chung, Y. Qin, M. Chau, J. J. Xu, G. Wang, R. Zheng, and H.Atabakhsh, “Crime data mining: An overview and case studies,†in Proceedings of the 2003 Annual National Conference on Digital Government Research, ser. dg.o ’03. Digital Government Society of North America, 2003, pp. 1–5. [Online]. Available: http://dl.acm.org/citation.cfm?id=1123196.1123231

      [2] Chu-xiang, S. Jian-jing, C. Bing, S. Chang-xing, and W. Yun-cheng, “An improvement apriori arithmetic based on rough set theory,â€in Circuits, Communications and System (PACCS), 2011 Third Pacific-Asia Conference on, July 2011, pp. 1–3.

      [3] A. Ben Aye, M. Ben Halima, and A. Alimi, “Survey on clustering methods: Towards fuzzy clustering for big data,†in Soft Computing and Pattern Recognition (SoCPaR), 2014 6th International Conference of, Aug 2014, pp. 331–336.

      [4] S. Sathyadevan, M. Devan, and S. Surya Gangadharan, “Crime analysis and prediction using data mining,†in Networks Soft Computing(ICNSC), 2014 First International Conference on, Aug 2014, pp. 406–412.

      [5] C.-H. Yu, M. Ward, M. Morabito, and W. Ding, “Crime forecasting using data mining techniques,†in Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, Dec 2011, pp. 779–786.

      [6] G. Yu, S. Shao, and B. Luo, “Mining crime data by using new similarity measure,†in Genetic and Evolutionary Computing, 2008. WGEC ’08. Second International Conference on, Sept 2008, pp. 389–392.

      [7] S. Kaza, D. Hu, H. Atabakhsh, and H. Chen, “Predicting criminal relationships using multivariate survival analysis,†in Proceedings of the 8th Annual International Conference on Digital Government Research: Bridging Disciplines & Domains, ser. dg.o ’07. Digital Government Society of North America, 2007, pp. 290–291. [Online]. Available: http://dl.acm.org/citation.cfm?id=1248460.1248524

      [8] G. Fogel and M. Cheung, “Derivation of quantitative structure-toxicity relationships for Eco toxicological effects of organic chemicals: evolving neural networks and evolving rules,†in Evolutionary Computation, 2005. The 2005 IEEE Congress on, vol. 1, Sept 2005, pp. 274–281 Vol.1.

      [9] McGregor, C. Cutely, and A. James, “Variability analysis with analytics applied to physiological data streams from the neonatal intensive care unit,†in Computer-Based Medical Systems (CBMS), 2012 25th International Symposium , June 2012, pp. 1–5.

      [10] M. Chau, J. J. Xu, and H. Chen, “Extracting meaningful entities from police narrative reports,†in Proceedings of the 2002 Annual National Conference on Digital Government Research, ser. dg.o ’02. Digital Government Society of North America, 2002, pp. 1–5. [Online].Available:http://dl.acm.org/citation.cfm?id=1123098.1123138

      [11] L. Cunhua, H. Yun, and Z. Zhao man, “An event ontology construction approach to web crime mining,†in Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on, vol. 5, Aug 2010, pp. 2441–2445.

      [12] I. Jayaweera, C. Sajeewa, S. Liyanage, T. Wijewardane, I. Perera, and A. Wijayasiri, “Crime analytics: Analysis of crimes through newspaper articles,†in Moratuwa Engineering Research Conference (MERCon), 2015, April 2015, pp. 277–282.

      [13] M. Sharma, “Z - crime: A data mining tool for the detection of suspicious criminal activities based on decision tree,†in Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on, Sept 2014, pp. 1–6.

      [14] A. Kawbunjun, U. Thongsatapornwatana, and W. Lilakiatsakun, “Framework of marketing or newsletter sender reputation system (fmnsrs),†in Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on, March 2015, pp. 420– 427.

      [15] L. Alfantoukh and A. Durresi, “Techniques for collecting data in social networks,†in Network-Based Information Systems (Nib’s), 2014 17th International Conference on, Sept 2014, pp. 336–341.

      [16] H. Jin and H. Liu, “Research on visualization techniques in data mining,†in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, Dec 2009, pp. 1–3.

      [17] KVM Hypervisor, accessed on: March 25, 2013. [Online]. Available: www.linux-kvm.org/.

      HadoopMap Reduce. [Online]. Available: http://hadoop.apache.org
  • Downloads

  • How to Cite

    Kumar, A., S, V., & Kayalvizhi, R. (2018). Using Mapreduce Techniques to Predict and Examine Crime Pattern. International Journal of Engineering & Technology, 7(3.12), 43-47. https://doi.org/10.14419/ijet.v7i3.12.15860