Project
Project
By
SCHOOL OF COMPUTING
SATHYABAMA
INSTITUTE OF SCIENCE AND TECHNOLOGY
(DEEMED TO BE UNIVERSITY)
Accredited with Grade “A++” by NAAC | Category 1 University by UGC
JEPPIAAR NAGAR, RAJIV GANDHISALAI,
CHENNAI - 600119
APRIL - 2024
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
InternalExaminer ExternalExaminer
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
Chapter No. TITLE Page No.
ABSTRACT v
1 INTRODUCTION 1
2 LITERATURE SURVEY 2
3 REQUIREMENTS ANALYSIS 7
REFERENCES 18
APPENDIX
A. SOURCE CODE 19
B. SCREENSHOTS 39
C. RESEARCH PAPER 43
D. CERTIFICATE 54
PAGE \* MERGEFORMAT 2
LIST OF FIGURES
PAGE \* MERGEFORMAT 2
LIST OF ABBRIVATIONS
ABBREVIATIONS EXPANSION
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
Data Collection
Dataset
Data Preparation
Model Selection
PAGE \* MERGEFORMAT 2
PAGE \* MERGEFORMAT 2
RESULTS AND DISCUSSION
The fuzzy-based geospatial crime category prediction for our crime mapping project
yielded insightful results, which are discussed herein. Utilizing a dataset
encompassing various crime categories and corresponding geographical coordinates,
we employed a fuzzy logic model for predictive analysis. Our evaluation metrics
included accuracy, precision, recall, and F1-score, providing a comprehensive
assessment of the model's performance.
The results demonstrated promising accuracy in predicting crime categories based on
geographic data. Overall, the fuzzy logic model achieved a commendable accuracy
rate, with specific crime categories exhibiting varying levels of prediction accuracy.
Notably, crimes with distinct geographic patterns, such as theft and vandalism, were
predicted with higher precision compared to those with more dispersed occurrences.
Spatial visualization of the predicted crime categories revealed intriguing patterns
across different geographic regions. Hotspots of certain crime types were accurately
identified by the model, aligning with known high-crime areas. However, the model
occasionally struggled to accurately predict crime categories in regions with complex
spatial dynamics or limited data availability.
In the discussion of our results, we acknowledge the strengths and limitations of the
fuzzy logic approach for geospatial crime prediction. The model's ability to incorporate
linguistic variables and fuzzy rules proved effective in capturing the inherent
uncertainty and ambiguity present in crime data. However, challenges such as the
selection of appropriate membership functions and rule base complexity necessitate
careful consideration for optimal model performance.
Furthermore, the practical implications of our findings for crime mapping and law
enforcement are noteworthy. The predictive insights derived from the fuzzy-based
geospatial crime category prediction can inform targeted crime prevention strategies
and resource allocation. Law enforcement agencies can leverage these insights to
deploy patrols, implement surveillance measures, and allocate resources more
efficiently, thereby enhancing public safety and crime deterrence.
Looking ahead, future research endeavors may focus on refining the fuzzy logic
model by integrating additional data sources, refining membership functions, and
exploring alternative inference mechanisms. Additionally, advancements in machine
learning techniques, such as deep learning and ensemble methods, offer avenues for
further improving the accuracy and robustness of geospatial crime prediction models.
PAGE \* MERGEFORMAT 2
Fig 5.1: Webpage
PAGE \* MERGEFORMAT 2
Fig 5.3: Input Data
PAGE \* MERGEFORMAT 2
Fig 5.5: Output prediction
PAGE \* MERGEFORMAT 2
CHAPTER 6
SUMMARY AND CONCLUSION
PAGE \* MERGEFORMAT 2
REFERENCES
[1] Ashesh Alma, Kalyani Kadam, Survey Paper on Crime Prediction using Ensemble
Approach, International journal of Pure and Applied Mathematics,2018.
[2] Dr .M.Sreedevi, A.Harha Vardhan Reddy, ch.Venkata Sai Krishna Reddy, Review on
crime Analysis and prediction Using Data Mining Techniques, International Journal of
Innovative Research in Science Engineering and technology ,2018.
[3] Deepika k.K, Smitha Vinod, Crime analysis in india using data minig techniques ,
International journal of Enginnering and technology, 2018.
[4] Ginger Saltos and Mihaela Coacea, An Exploration of Crime prediction Using Data
Mining on Open Data, International journal of Information technology & Decision
Making,2017.
[5] H. Benjamin Fredrick David and A.Suruliandi,Survey on crime analysis and prediction
using data mining techniques, ICTACT Journal on Soft computing, 2017.
[6] Hitesh Kumar Reddy ToppyiReddy, Bhavana Saini, Ginika mahajan, Crime Prediction
&Monitoring Framework Based on Spatial Analysis, International Conference on
Computational Intelligence Data Science (ICCIDS 2018).
[7] K.S.N .Murthy, A.V.S.Pavan kumar, Gangu Dharmaraju, international journal of
engineering, Science and mathematics, 2017.
[8] Khushabu A.Bokde, Tisksha P.Kakade, Dnyaneshwari S. Tumasare, Chetan G.Wadhai
B.E Student, Crime Detection Techniques Using Data Mining and K- Means, International
Journal of Engineering Research & technology (IJERT) ,2018.
[9] Rajkummar.S, Sakkarai Pandi.M, Crime Analysis and prediction using data mining
techniques, International Journal of recent trends in engineering & research,2019.
[10]Shiju Sathyadevan, Devan M.S, Surya Gangadharan.S, Crime Analysis and Prediction
Using Data Mining, First International Conference on networks & soft computing (IEEE)
2014.
[11] Sarpreet kaur, Dr. Williamjeet Singh, Systematic review of crime data mining,
International Journal of Advanced Research in computer science , 2015.
[12]Tushar Sonawanev, Shirin Shaikh, rahul Shinde, Asif Sayyad, Crime Pattern Analysis,
Visualization And prediction Using Data Mining, Indian Journal of Computer Science and
Engineering (IJCSE), 2015.
PAGE \* MERGEFORMAT 2
APPENDIX
A. SOURCE CODE
import pandas as pd
import matplotlib.pyplot as plt
import seaborn as sns
df= pd.read_csv('new.csv')
df
df = df.dropna()
df.info()
df['Date'] = pd.to_datetime(df['Date'])
df['Year'] = df['Date'].dt.year
df['Month'] = df['Date'].dt.month
df['Day'] = df['Date'].dt.day
df['dayOfWeek'] = df['Date'].dt.day_name()
df['WeekOfYear'] = df['Date'].dt.weekofyear
df['Hour'] = df['Date'].dt.hour
df['Minute'] = df['Date'].dt.minute
df['Second'] = df['Date'].dt.second
df.head()
df['Hour'].unique()
df['dayOfWeek'].unique()
df.loc[df['dayOfWeek']=='Monday','dayOfWeek'] = 0
df.loc[df['dayOfWeek']=='Tuesday', 'dayOfWeek'] =1
df.loc[df['dayOfWeek']=='Wednesday', 'dayOfWeek'] = 2
df.loc[df['dayOfWeek']=='Thursday', 'dayOfWeek'] =3
df.loc[df['dayOfWeek']=='Friday', 'dayOfWeek'] =4
df.loc[df['dayOfWeek']=='Saturday', 'dayOfWeek'] =5
df.loc[df['dayOfWeek']=='Sunday', 'dayOfWeek'] =6
plt.rcParams["figure.figsize"] = (150,100)
x = df [['Year','Month','Day','dayOfWeek','Minute','Second','Latitude','Longitude']]
y =df['Primary Type']
from sklearn.model_selection import train_test_split
X_train, X_test, y_train, y_test = train_test_split(x, y, test_size = 0.2,
random_state = 42)
PAGE \* MERGEFORMAT 2
from sklearn.ensemble import RandomForestClassifier
from sklearn import metrics
rf = RandomForestClassifier(n_estimators=100,random_state=60,max_depth = 50)
rf = rf.fit(X_train, y_train)
rf.score(X_train,y_train)
from sklearn.metrics import accuracy_score
y_pred = rf.predict(X_test )
accuracy_score(y_pred,y_test)
import sklearn.metrics
print(sklearn.metrics.classification_report(y_test, y_pred))
y_pred = rf.predict(X_test )
y_true=y_test
from sklearn.metrics import confusion_matrix
cm=confusion_matrix(y_true,y_pred)
cm
import seaborn as sns
import matplotlib.pyplot as plt
f, ax=plt.subplots(figsize=(5,5))
sns.heatmap(cm,annot=True,linewidths=0.5,linecolor="red",fmt=".0f",ax=ax)
plt.xlabel("y_pred")
plt.ylabel("y_true")
plt.show()
import pickle
pickle.dump(rf, open('model.pkl', 'wb'))
model = pickle.load( open('model.pkl', 'rb') )
/*!
* Bootstrap-select v1.13.1 (https://developer.snapappointments.com/bootstrap-select)
*
* Copyright 2012-2018 SnapAppointments, LLC
* Licensed under MIT
(https://github.com/snapappointments/bootstrap-select/blob/master/LICENSE)
*/
PAGE \* MERGEFORMAT 2
select.bs-select-hidden,
.bootstrap-select > select.bs-select-hidden,
select.selectpicker {
display: none !important;
}
.bootstrap-select {
width: 100% \0;
/IE9 and below/
}
.bootstrap-select > .dropdown-toggle {
position: relative;
width: 100%;
z-index: 1;
text-align: right;
white-space: nowrap;
}
.bootstrap-select > .dropdown-toggle.bs-placeholder,
.bootstrap-select > .dropdown-toggle.bs-placeholder:hover,
.bootstrap-select > .dropdown-toggle.bs-placeholder:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder:active {
color: #999;
}
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-primary,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-secondary,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-success,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-danger,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-info,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-dark,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-primary:hover,
bootstrap-select > .dropdown-toggle.bs-placeholder.btn-secondary:hover,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-success:hover,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-danger:hover,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-info:hover,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-dark:hover,
PAGE \* MERGEFORMAT 2
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-primary:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-secondary:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-success:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-danger:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-info:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-dark:focus,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-primary:active,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-secondary:active,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-success:active,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-danger:active,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-info:active,
.bootstrap-select > .dropdown-toggle.bs-placeholder.btn-dark:active {
color: rgba(255, 255, 255, 0.5);
}
.bootstrap-select > select {
position: absolute !important;
bottom: 0;
left: 50%;
display: block !important;
width: 0.5px !important;
height: 100% !important;
padding: 0 !important;
opacity: 0 !important;
border: none;
}
.bootstrap-select > select.mobile-device {
top: 0;
left: 0;
display: block !important;
width: 100% !important;
z-index: 2;
}
PAGE \* MERGEFORMAT 2
.has-error .bootstrap-select .dropdown-toggle,
.error .bootstrap-select .dropdown-toggle,
.bootstrap-select.is-invalid .dropdown-toggle,
.was-validated .bootstrap-select .selectpicker:invalid + .dropdown-toggle {
border-color: #b94a48;
}
.bootstrap-select.is-valid .dropdown-toggle,
.was-validated .bootstrap-select .selectpicker:valid + .dropdown-toggle {
border-color: #28a745;
}
.bootstrap-select.fit-width {
width: auto !important;
}
bootstrap-select:not([class*="col-"]):not([class*="form-control"]):not(.input-group-btn) {
width: 90%;
}
.bootstrap-select .dropdown-toggle:focus {
outline: thin dotted #333333 !important;
outline: 5px auto -webkit-focus-ring-color !important;
outline-offset: -2px;
}
.bootstrap-select.form-control {
margin-bottom: 0;
padding: 0;
border: none;
}
:not(.input-group) > .bootstrap-select.form-control:not([class*="col-"]) {
width: 100%;
}
.bootstrap-select.form-control.input-group-btn {
z-index: auto;
}
.bootstrap-select.form-control.input-group-btn:not(:first-child):not(:last-child) > .btn {
border-radius: 0;
PAGE \* MERGEFORMAT 2
}
.bootstrap-select:not(.input-group-btn),
.bootstrap-select[class*="col-"] {
float: none;
display: inline-block;
margin-left: 0;
}
.bootstrap-select.dropdown-menu-right,
.bootstrap-select[class*="col-"].dropdown-menu-right,
.row .bootstrap-select[class*="col-"].dropdown-menu-right {
float: right;
}
.form-inline .bootstrap-select,
.form-horizontal .bootstrap-select,
.form-group .bootstrap-select {
margin-bottom: 0;
}
.form-group-lg .bootstrap-select.form-control,
.form-group-sm .bootstrap-select.form-control {
padding: 0;
}
.form-group-lg .bootstrap-select.form-control .dropdown-toggle,
.form-group-sm .bootstrap-select.form-control .dropdown-toggle {
height: 100%;
font-size: inherit;
line-height: inherit;
border-radius: inherit;
}
.bootstrap-select.form-control-sm .dropdown-toggle,
.bootstrap-select.form-control-lg .dropdown-toggle {
font-size: inherit;
line-height: inherit;
border-radius: inherit;
}
PAGE \* MERGEFORMAT 2
.bootstrap-select.form-control-sm .dropdown-toggle {
padding: 0.25rem 0.5rem;
}
.bootstrap-select.form-control-lg .dropdown-toggle {
padding: 0.5rem 1rem;
}
.form-inline .bootstrap-select .form-control {
width: 100%;
}
.bootstrap-select.disabled,
.bootstrap-select > .disabled {
cursor: not-allowed;
}
.bootstrap-select.disabled:focus,
.bootstrap-select > .disabled:focus {
outline: none !important;
}
bootstrap-select.bs-container {
position: absolute;
top: 0;
left: 0;
height: 0 !important;
padding: 0 !important;
}
.bootstrap-select.bs-container .dropdown-menu {
z-index: 1060;
}
.bootstrap-select .dropdown-toggle:before {
content: '';
display: inline-block;
}
.bootstrap-select .dropdown-toggle .filter-option {
position: absolute;
top: 0;
PAGE \* MERGEFORMAT 2
left: 0;
padding-top: inherit;
padding-right: inherit;
padding-bottom: inherit;
padding-left: inherit;
height: 100%;
width: 100%;
text-align: left;
}
.bootstrap-select .dropdown-toggle .filter-option-inner {
padding-right: inherit;
}
.bootstrap-select .dropdown-toggle .filter-option-inner-inner {
overflow: hidden;
}
.bootstrap-select .dropdown-toggle .caret {
position: absolute;
top: 50%;
right: 12px;
margin-top: -2px;
vertical-align: middle;
}
.input-group .bootstrap-select.form-control .dropdown-toggle {
border-radius: inherit;
}
.bootstrap-select[class*="col-"] .dropdown-toggle {
width: 100%;
}
.bootstrap-select .dropdown-menu {
min-width: 100%;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
PAGE \* MERGEFORMAT 2
.bootstrap-select .dropdown-menu > .inner:focus {
outline: none !important;
}
.bootstrap-select .dropdown-menu.inner {
position: static;
float: none;
border: 0;
padding: 0;
margin: 0;
border-radius: 0;
-webkit-box-shadow: none;
box-shadow: none;
}
.bootstrap-select .dropdown-menu li {
position: relative;
}
bootstrap-select .dropdown-menu li.active small {
color: #fff;
}
.bootstrap-select .dropdown-menu li.disabled a {
cursor: not-allowed;
}
.bootstrap-select .dropdown-menu li a {
cursor: pointer;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
}
.bootstrap-select .dropdown-menu li a.opt {
position: relative;
padding-left: 2.25em;
}
.bootstrap-select .dropdown-menu li a span.check-mark {
PAGE \* MERGEFORMAT 2
display: none;
}
.bootstrap-select .dropdown-menu li a span.text {
display: inline-block;
}
.bootstrap-select .dropdown-menu li small {
padding-left: 0.5em;
}
.bootstrap-select .dropdown-menu .notify {
position: absolute;
bottom: 5px;
width: 96%;
margin: 0 2%;
min-height: 26px;
padding: 3px 5px;
background: #f5f5f5;
border: 1px solid #e3e3e3;
-webkit-box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.05);
box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.05);
pointer-events: none;
opacity: 0.9;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
.bootstrap-select .no-results {
padding: 3px;
background: #f5f5f5;
margin: 0 5px;
white-space: nowrap;
}
.bootstrap-select.fit-width .dropdown-toggle .filter-option {
position: static;
display: inline;
PAGE \* MERGEFORMAT 2
padding: 0;
}
.bootstrap-select.fit-width .dropdown-toggle .filter-option-inner,
.bootstrap-select.fit-width .dropdown-toggle .filter-option-inner-inner {
display: inline;
}
.bootstrap-select.fit-width .dropdown-toggle .caret {
position: static;
top: auto;
margin-top: -1px;
}
.bootstrap-select.show-tick .dropdown-menu .selected span.check-mark {
position: absolute;
display: inline-block;
right: 15px;
top: 5px;
}
.bootstrap-select.show-tick .dropdown-menu li a span.text {
margin-right: 34px;
}
.bootstrap-select .bs-ok-default:after {
content: '';
display: block;
width: 0.5em;
height: 1em;
border-style: solid;
border-width: 0 0.26em 0.26em 0;
-webkit-transform: rotate(45deg);
-ms-transform: rotate(45deg);
-o-transform: rotate(45deg);
transform: rotate(45deg);
}
.bootstrap-select.show-menu-arrow.open > .dropdown-toggle,
.bootstrap-select.show-menu-arrow.show > .dropdown-toggle {
PAGE \* MERGEFORMAT 2
z-index: 1061;
}
.bootstrap-select.show-menu-arrow .dropdown-toggle .filter-option:before {
content: '';
border-left: 7px solid transparent;
border-right: 7px solid transparent;
border-bottom: 7px solid rgba(204, 204, 204, 0.2);
position: absolute;
bottom: -4px;
left: 9px;
display: none;
}
.bootstrap-select.show-menu-arrow .dropdown-toggle .filter-option:after {
content: '';
border-left: 6px solid transparent;
border-right: 6px solid transparent;
border-bottom: 6px solid white;
position: absolute;
bottom: -4px;
left: 10px;
display: none;
}
.bootstrap-select.show-menu-arrow.dropup .dropdown-toggle .filter-option:before {
bottom: auto;
top: -4px;
border-top: 7px solid rgba(204, 204, 204, 0.2);
border-bottom: 0;
}
.bootstrap-select.show-menu-arrow.dropup .dropdown-toggle .filter-option:after {
bottom: auto;
top: -4px;
border-top: 6px solid white;
border-bottom: 0;
}
PAGE \* MERGEFORMAT 2
.bootstrap-select.show-menu-arrow.pull-right .dropdown-toggle .filter-option:before {
right: 12px;
left: auto;
}
.bootstrap-select.show-menu-arrow.pull-right .dropdown-toggle .filter-option:after {
right: 13px;
left: auto;
}
.bootstrap-select.show-menu-arrow.open > .dropdown-toggle .filter-option:before,
.bootstrap-select.show-menu-arrow.show > .dropdown-toggle .filter-option:before,
.bootstrap-select.show-menu-arrow.open > .dropdown-toggle .filter-option:after,
.bootstrap-select.show-menu-arrow.show > .dropdown-toggle .filter-option:after {
display: block;
}
.bs-searchbox,
.bs-actionsbox,
.bs-donebutton {
padding: 4px 8px;
}
.bs-actionsbox {
width: 100%;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
.bs-actionsbox .btn-group button {
width: 50%;
}
.bs-donebutton {
float: left;
width: 100%;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
PAGE \* MERGEFORMAT 2
}
.bs-donebutton .btn-group button {
width: 100%;
}
.bs-searchbox + .bs-actionsbox {
padding: 0 8px 4px;
}
.bs-searchbox .form-control {
margin-bottom: 0;
width: 100%;
float: none;
}
/*# sourceMappingURL=bootstrap-select.css.map *Thank you for your business! We
look forward to working with you again.
html, body {
height: 100%;
}
.floatleft {
float: left;
}
.floatright {
float: right;
}
.alignleft {
float: left;
margin-right: 15px;
margin-bottom: 15px;
}
.alignright {
float: right;
PAGE \* MERGEFORMAT 2
margin-left: 15px;
margin-bottom: 15px;
}
.aligncenter {
display: block;
margin: 0 auto 15px;
}
a:focus {
outline: 0px solid;
}
img {
max-width: 100%;
height: auto;
}
fix {
overflow: hidden;
}
p{
margin: 0 0 15px;
color: #444;
}
PAGE \* MERGEFORMAT 2
h1 {
font-size: 48px;
line-height: 50px;
}
h2 {
font-size: 38px;
line-height: 40px;
}
h3 {
font-size: 30px;
line-height: 32px;
}
h4 {
font-size: 24px;
line-height: 26px;
}
h5 {
font-size: 20px;
line-height: 22px;
}
h6 {
font-size: 16px;
line-height: 20px;
}
a{
transition: all 0.3s ease 0s;
PAGE \* MERGEFORMAT 2
text-decoration: none;
}
a:hover {
color: #3EC1D5;
text-decoration: none;
}
a:active, a:hover {
outline: 0 none;
}
body {
background: #fff none repeat scroll 0 0;
color: #444;
font-family: 'Open Sans', sans-serif;
font-size: 18px;
text-align: left;
overflow-x: hidden;
line-height: 22px;
}
.back-to-top:hover {
background: #3cd6ed;
color: #fff;
}
.clear {
clear: both;
}
ul {
list-style: outside none none;
margin: 0;
padding: 0;
}
.back-to-top:focus {
PAGE \* MERGEFORMAT 2
background: #3EC1D5;
color: #fff;
outline: none;
}
.back-to-top:hover {
background: #3cd6ed;
color: #fff;
}
.clear {
clear: both;
}
ul {
list-style: outside none none;
margin: 0;
padding: 0;
}
PAGE \* MERGEFORMAT 2
.section-headline h2::after {
border: 1px solid #333;
bottom: -20px;
content: "";
left: 0;
margin: 0 auto;
position: absolute;
right: 0;
width: 40%;
}
.sec-head {
display: inline-block;
font-size: 17px;
font-weight: 600;
margin-bottom: 0;
padding: 0 0 10px;
text-transform: uppercase;
transition: all 0.4s ease 0s;
}
PAGE \* MERGEFORMAT 2
B. SCREENSHOTS
PAGE \* MERGEFORMAT 2
Fig. B.2: Dataset
PAGE \* MERGEFORMAT 2
Fig.B.4: Pre-processing the data
PAGE \* MERGEFORMAT 2
Fig.B.6: Creating the Model
C. RESEARCH PAPER
ABSTRACT: As a clean kind of crime, being evaluated. The kind of crime, time
causing issues for people and society is of day, and location all have important
seen nowadays. Increased crime leads roles. Using learning techniques like the
to increased inequality among the Random Forest Classifier, this matches
country's voters. The structure of the students into distinct classes. When
crime must be understood in order to compared to preset occupations, the
evaluate and comprehend this type of ensuing crime and caring behaviors
criminal behavior. This direction has have been shown to be relatively
given the use of open-source criminal extreme.
analysis from Kaggle in which the
prediction of the most recent crimes is KEYWORDS: K-Method, Simple Sign,
created. This project's key factor is Prediction Fee Regression, association,
PAGE \* MERGEFORMAT 2
rule mining etc. attempted to be repeated in the same
case. In criminal cases, it depends on
INTRODUCTION many factors like the intelligence of the
criminals, security of the area, work
Every day, the crime rate is being done on the clues used in the data.
observed as cutting-edge technology Data collection, data classification,
and high-tech techniques aid criminals pattern recognition, prediction, and
in reaching their goals. However, visualization are encompassed by
according to the Crime Bureau, crimes critical steps in analysis. The proposed
such as theft, arson, murder, rape, and framework utilizes various visualization
cruelty have increased, as has group techniques to depict crime trends and
betting. Crime- related information is employs different methods for
gathered from multiple blogs, predicting crime. Machine learning
information, and websites. Creating a algorithms are utilized, and time (hour,
database of crime reports necessitates day, month, and year), location (latitude
the utilization of massive volumes of and longitude), and type of crime
data as records. Crime rates can be constitute the input data for our
lessened by knowledge received algorithm are :
through machine learning techniques. -Robbery
Quick detection of criminals and crime- -Rape
prone locations is possible. Faster -Theft
enablement of pay payments and the -The Killing
provision of accurate consequences are -Abduction
facilitated by machine learning when It is possible that some criminal act may
applied to crime datasets, which are have been committed due to this.
informative with machine learning Various types of algorithms, including
techniques. A unique way to discover random forests, are tested. Several
crime hotspots has been found by law additional tasks are performed: first, an
enforcement officials. Regions where attempt is made to guess which of the 6
crime is fairly focused are alluded to. types of crimes occurred most often,
Better results in the fight against crime and then an attempt is made, which
reporting datasets can be achieved includes violence and violent crimes.
through the utilization of machine
learning techniques. The first step in the OBJECTIVE
study of crime is represented by the
analysis. Through the exploration, Our paintings are ceased.
connection, and revelation of Before the crime is taken place.
relationships in crime research, Crime scenes are provided.
statistics, queries, and reports on Crime is modelled.
demand are generated. This is how it Crimes are described consistent
helps to determine if payment is needed with the place where they arise.
for a particular known item or a new
model. Crimes, as recommended RELATED WORK
actions by active criminals, may be
referred to as such. If so, the offense is A literature evaluation is considered to
PAGE \* MERGEFORMAT 2
be an essential step in the software crime from statistics to better
development process. Portrayed are comprehend criminal behaviour, and,
two test cases given, and each case is combined with records analysis, the
considered, outlining the outcomes that prevention of future crimes is targeted.
empower elements of the organization. Although many mining techniques use
The subsequent stage is concluded, rule mining and affiliation strategies,
determining which working system and fewer tactics are focused on crime
apparatus language can be utilized to prediction models. In this article,
grow the gadget once those conditions various sorts of LSOA (Lower Layer
are met. Massive external support is over Output Area) models predicting the
required when an instrument is being frequency of crime and delinquent
created by software engineers, and this behaviour are examined. A variety of
assistance can be obtained from senior methods, such as learning, regression,
packages, books, or websites. When and decision trees, are employed with
planning the objectives of the system three algorithms. The records,
before building the machine, the above consisting of over 600,000 records
points are kept in mind. The before processing, are provided by UK
development scope is considered by police forces. The results indicate that
most businesses, and a thorough the recurrence of a specific type of
evaluation of everything necessary for crime and delinquent behaviour can be
the project's development is conducted. anticipated using choice trees (M5P
Documentation review is considered the algorithm), considering prediction
most essential part of the software performance and processing time.
development process for any reason.
The factors, resource requirements, 2. Wrongdoing Examination and
manpower, finance, and strengths of Forecast Utilizing Information Mining
the company are recognized and
analyzed before the equipment is Crime evaluation and prevention are
developed and incorporated into the techniques for identifying and analyzing
project. After thoroughly and carefully criminal patterns and developments.
checking all of these parameters, the Regions with an excessive possibility of
specification of the software on the crime can be predicted, and crime-
concerned computer is decided, susceptible regions can be visualized
according to which type of operating by our gadget. The method involved in
system is needed for the purpose, and tackling wrongdoings can be
all the necessary software is required. accelerated by cops through crime data
The development of the system and evaluation using computerized systems.
associated functions, along with a Previously unknown useful information
degree, is carried forward. can be extracted from unstructured
information by the possibility of insights
1. Predictive Crime Research via mining. It is a technique between pc
Open Data Mining technology and criminal justice that
makes information mining assist in
It involves an increase in study methods solving wrongdoings more quickly.
aimed at extracting an understanding of Often, the day-to-day elements of crime
PAGE \* MERGEFORMAT 2
are focused on rather than the reasons
for wrongdoing, alongside criminal Strategies. The process of generating
climate and political hostility. Crime critical data for a company through data
Detection Techniques use Data Mining mining involves evaluating and
and K-Means. analyzing large pre-existing databases.
Extracting new information from existing
3. Solving Procedures Utilizing datasets is part of the predictions made.
Information Mining and K -Media The application of various analytical
and inferential strategies in criminology
If crime is repeated within the society, involves using information mining, with
institutions and businesses will be significant work conducted. Integration
impacted in some way or another. of all this information has been
Therefore, it seems essential to attempted. Police departments and
examine the reasons, factors, and similar criminal justice organizations
interrelationships of various crime maintain numerous large databases for
phenomena with the purpose of predicting or analyzing criminal activity
discovering the most appropriate and behaviour within the community.
methods to control and prevent crime. Utilizing crime information to identify
The reasons, factors, and criminals is also done. Efforts have
interrelationships of various been made to integrate this information.
The examination of crime phenomena The primary objective of this work is to
aims to uncover the most suitable investigate the learning techniques,
methods for controlling and preventing both visible and invisible, employed in
crime. The essential objective of this discovering criminals. This paper
paper is to have association violations presents a study of criminology and
separated according to the recurrence prediction using multiple mining
in their commonness in particular years. techniques.
Information mining is comprehensively
used to explore, inspect, and select 5. Criminal Example Examination,
examples of various wrongdoings. A Representation and Expectation
hypothetical model was executed based Utilizing Information Mining
on statistics mining methods, including
classification and type, on genuine Concerns about crimes against women
presence wrongdoing data kept by are present in all countries worldwide
police in Britain and Grains between today. Many countries are making
1990 and 2011. The model's quality efforts to address this issue.
was enhanced and low values were Implementation of preventive measures
eliminated by weighting the abilities. is underway to decrease crimes against
The parameters of outlier detection women. A significant amount of
were optimized using a genetic information is generated from crime
algorithm (GA) and its Quick Miner tool. reports annually. This information is
highly useful for studying and predicting
4. Research the usage of facts on crimes, contributing to the prevention of
crime evaluation and information crimes to some extent. The analysis of
mining crime is a crucial part of police
PAGE \* MERGEFORMAT 2
department work. Crime information understated. The indirect connection
analysis can help examine crime between the crimes is significant. This
patterns, clues to interrelationships, etc. is why statistics mining can be very
The significance of the indirect beneficial in solving, visualizing, and
connection between crimes cannot be predicting crimes using crime datasets.
Grouping and correlating records make information mining. Rather than
it easier to identify similarities and focusing on the causes of crime, such
differences between data objects. The as criminal climate and political hostility,
group data item is used as a table. The the emphasis is primarily on the daily
dataset is specified in a predefined factors of crime.
state. A link has been provided,
encompassing various types of crimes 7. A Systematic evaluate of crime
against women in different states and statistics collection
urban communities of India. Crime
planning control can assist in planning Criminal patterns and tendencies are
crime prevention strategies, and, Data systematically identified and analyzed
mining methods assist in predicting and through criminology. With the
visualizing information in various advancement of computer systems, the
formats for a better understanding of process of solving crimes can be
crime patterns. Crime analysis utilizes expedited by law enforcement with the
data mining techniques. This kind assistance of crime data analysts.
information Records can be examined for
previously unknown valuable
6. Wrongdoing Examinationand information through the utilization of the
Expectation Utilizing Information concept of data mining. The
Mining Techniques identification of criminals is facilitated by
predictive policing, employing analytical
The method employed in crime techniques and predictive strategies,
assessment and prevention involves proving highly effective. Due to the
identifying and analyzing criminal increased crime rates in recent years,
patterns and trends. Anticipation of the challenge of handling large
areas with a high probability of crime quantities of crime statistics stored in
can be facilitated, and regions prone to warehouses arises, which can be very
wrongdoing can be visualized by our challenging to manually analyze. The
system. With the advent of automated police are urged to take a proactive
systems, the process of solving crimes stance. An evaluation of the methods
can be expedited by crime data analysis and techniques used for the
using computerized methods. The identification of criminals is presented in
application of the concept of data this article.
mining allows previously unknown
valuable information to be extracted 8. A Thesis on Crime Prediction via
from unstructured data. It is a technique Holistic Approach
between computer science and criminal
justice that enables crimes to be solved The paper explores several data mining
more quickly with the assistance of and learning algorithms utilized in data
PAGE \* MERGEFORMAT 2
mining. An overview of crime analysis because the classifier uses explicit
and forecasting techniques is presented values, which obscures the results.
in this dissertation. The technique of For mentioned names with higher cost
reducing future crimes by identifying results. The methods are not suitable
and predicting them is known as crime for classifying regions with real data
forecasting. Historical data is used in and features. The values of the
the practice of crime forecasting, and, classifier must be in range, so it is
after analyzing the information, future essential to specify the best value.
crime is predicted based on region, System architecture design is the plan
time, day, season, and year. The way of characterizing the subsystems
number of crimes is increasing rapidly, that make up the device and the control
making it essential to more accurately and conversation structure of the
predict future crimes. Solving the subsystems. The reason of an
problem of crime by discovering hidden architect's mission is to create the
crime patterns is greatly facilitated by overall structure of a software device.
data mining technology. Therefore, the
aim of this study is to have the various PROPOSED SYSTEM
analyzed and discussed. techniques
used for crime forecasting and analysis.
A rational analysis of data mining and
predictive type techniques for detecting
future crimes is presented in this paper.
Filters and machine learning layers are
EXISTING SYSTEM first employed to preprocess the
obtained data, removing redundant and
In pre-processing, the dataset acquired duplicate values, while also reducing
from an open source is initially pre- dimensionality for cleaner data.
processed to eliminate existing Subsequently, a fragmentation process
duplicate values. A decision tree is is applied to the extra data, dividing it
used to extract features from large into testing and training datasets. The
amounts of data and identify crime dataset is utilized for both training and
patterns. It provides a primary testing the model. The objective is to
framework for the process of further transform the type of crime, year,
classifying the included data. Crime month, time, date, and region into
patterns are identified using deep integers for easy classification. A
neural networks. Performance, as random jump classifier is initially used
expected, computer-trained and tested to generate independent influence
quotes. Crime forecasting helps predict between the features. This
any type of future, solving crimes as characterization of crimes enables the
quickly as possible, and supporting the analysis of crime occurrences at
government. specific times and places. Ultimately,
crimes that are spatially and temporally
Disadvantages of Existing System:
frequent are identified. The model's
information is filled by calculating
Previous works have low accuracy
accuracy. Python is the language
PAGE \* MERGEFORMAT 2
utilized for developing predictive from Kaggle and other resources.
models, and it executes analytical and
machine-learning models. Records Series :
Fig-8
Fig-4
Fig-9
Fig-5
Fig-10
CONCLUSION REFERENCES
PAGE \* MERGEFORMAT 2
International Journal of Advanced
Research in computer science, 2015.#
DEPARTMENT OF COMPUTER
SCIENCE AND ENGINEERING
Ayisheshim Almaw, Kalyani Kadam,
Survey Paper on Crime Prediction
using Ensemble Approach, International
journal of Pure and Applied
Mathematics,2018.
PAGE \* MERGEFORMAT 2
8.Dr .M.Sreedevi, A.Harha Vardhan
Reddy, ch.Venkata Sai Krishna Reddy,
Review on crime Analysis and
prediction Using Data Mining
Techniques, International Journal of
Innovative Research in Science
Engineering and technology ,2018.
9. K.S.N .Murthy, A.V.S.Pavan kumar,
Gangu Dharmaraju, international
journal of engineering, Science and
mathematics, 2017.
10. Deepiika k.K, Smitha Vinod, Crime
analysis in india using data minig
PAGE \* MERGEFORMAT 2