0% found this document useful (0 votes)
9 views

STC Report 44

STC_Report

Uploaded by

flutterpranav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

STC Report 44

STC_Report

Uploaded by

flutterpranav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Seminar Report

On

DATA MINING FOR CRIME


INVESTIGATION
By

Amol Funde

Roll No:- 44
Exam seat No.: ____________

Under the guidance


of
Prof. Pratima Kadam Mam

DEPARTMENT OF COMPUTER ENGINEERING


Bharati Vidyapeeth’s College of Engineering, Lavale, Pune
PIN-412115
Savitribai Phule Pune University
[2023-2024]
Departmentof Computer Engineering,
BharatiVidyapeeth’sCollegeof
Engineering, Lavale, Pune.

CERTIFICATE

This is to certify that Mr. Amol Shahadev Funde from Third Year Computer
Engineering has successfully completed his seminar work titled “ DATA MINING FOR
CRIME INVESTIGATION ”at Bharati Vidyapeeth’s College of Engineering, Lavale,
Pune in the partial fulfilment of the bachelor’s degree in engineering.

Seminar Guide Head of the Department Principal


Department of Computer Engineering, BVCOE, Lavale Pune

Abstract And Keywords

Vulnerability Crime rate is increasing very fast in India. With the existing crime
investigation techniques, officers have to spend a lot of time as well as man power to
identify suspects and criminals. As large amount of information is collected during
crime investigation, data mining is an approach which can be useful in this perspective.
Data mining is a process that extracts useful information from large amount of crime
data so that possible suspects of the crime can be identified efficiently. Best performing
algorithm will be used against sample crime and criminal database to identify possible
suspects of the crime.
Crime investigation is a critical aspect of maintaining public safety and ensuring
the rule of law. With the advent of technology and the proliferation of digital data, law
enforcement agencies are increasingly turning to data mining techniques to aid in their
investigative efforts. This paper presents an overview of the application of data mining
in crime investigation, focusing on its role in uncovering hidden patterns, predicting
criminal activities, and enhancing decision- making processes.
The primary objective of this research is to highlight the potential of data mining
as a valuable tool for law enforcement agencies in solving and preventing crimes. We
explore various data sources, including crime reports, geographic data, social media, and
surveillance footage, and discuss the challenges and ethical considerations associated
with collecting and analyzing such data. The paper delves into different data mining
techniques such as clustering, classification, and association rule mining, demonstrating
how they can be applied to identify crime hotspots, suspect profiles, and modus
operandi. Additionally, predictive modeling using machine learning algorithms is
discussed to forecast future criminal activities, allocate resources effectively, and
prioritize investigations.
Ethical and privacy concerns surrounding the use of personal data in crime investigations
are addressed, emphasizing the importance of responsible data handling practices and
adherence to legal and ethical standards. The results of this research illustrate the
significant potential of data mining in crime investigation, highlighting its ability to assist
law enforcement agencies in understanding crime patterns, making informed decisions,
and ultimately enhancing public safety. As technology continues to advance, the
integration of data mining techniques into crime. investigation procedures is likely to
become even more crucial in the ongoing effort to combat criminal activities and maintain
a safer society.
Department of Computer Engineering, BVCOE, Lavale Pune

KEYWORDS:
Criminal Investigation, Data Mining, Suspect Prediction, Criminology, Cloud Technology,
Mobile Application, Prediction Algorithms, Crime Analysis
Acknowledgements

It gives us a great pleasure in presenting the preliminary Seminar report on CRIME


INVESTIGATION USING DATA MINING.

We would like to thank our internal guide PROF. PRATIMA KADAM MAM for giving
us all the help and guidance we needed. We are really grateful to them for their kind support
and their valuable suggestions.

I would like to thank to all faculties and friends who directly or indirectly supported me
time to time. I also wish to express my deepest gratitude to head of the department
Dr.P.V.Rathod and all the faculty and staff members of Information Technology Engg.
Department for their valuable support

Sincerely,

AMOL FUNDE ( 44 )

Department of Computer Engineering, BVCOE, Lavale Pune


Index

Sr. No. Title Page No. Remark

1 Introduction 1

2 Literature Survey 8

3 14
Problem Definition and scope

4 Software Requirement 16
Specification

5 Conclusions 23

6 References 24

7 Report Documentation 25
VAPT – Bug Bounty Recon Tool 7

1.Introduction

1.1 Introduction:

1.1.1 Seminar Idea

• Crime rate is widely increasing day to day so we need some investigation


techniques using which our police department can get some sort of idea to solve
the problem. So we have designed a crime investigation mobile application which
is used for suspect prediction using different prediction algorithms, data mining
techniques and on the basis of data available in the database. All the data entered
by the user is stored on the cloud using the Cloud Technologies. Finally, crime
analysis is performed using all these techniques and algorithms.

1.1.2 Motivation of the Seminar

• In India, police department is the largest unit for preventing crimes, maintaining law
orders, rules and peace throughout the country. However problem with the Indian
police is that they are still using the traditional manual process such as First
Information Report (FIR) to keep and analyze the records crime and criminals. On
the other hand, criminals use more sophisticated technologies to commit the crime.
In 2011, 34305 cases of murder, 31385 cases of half murder, 24206 cases of rape,
44664 cases of kidnapping and around 600000 cases of robbery, theft and dacoit
were recorded. Total numbers of crime cases recorded were 325575. This is only
the statistics of recorded crimes. Crime rate is increasing very fast in India and we
are becoming unsafe. If we perform necessary calculations on the above statistics,
police department has to handle near about 6400 cases per day. In order to prevent
crimes police officer, have to identify evidences for those cases.

1.2 Objectives of data mining for crime investigation:

The primary objectives of this project are as follows:

• Manually managed evidence storing using user friendly application interface.

• Storing collected evidence (data) in structured format over cloud platform.

• Analyzing and generating useful information for Investigator and Criminal

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 8

2.Literature Survey

Crimes are a social disturbance and cost the general public to a great degree from
numerous points of view. Any examination that can help in breaking down and
solving crime faster pays for itself. Crime data mining has the capacity of extricating
helpful data and concealed examples from the substantial wrongdoing informational
indexes. The crime data mining challenges are getting to be fortifying open doors for
the coming years. Since the writing of crime information mining has expanded
energetically as of late, it winds up obligatory to build up a diagram of the cutting
edge. This orderly survey centers around crime data mining procedures and
innovations utilized as a part of past investigations. The current work is grouped into
various classifications and is introduced utilizing perceptions. Crime Data information
mining and examination is a dynamic territory of research. The consequences of this
investigation may help new potential clients in understanding the scope of accessible
wrongdoing in- formation mining methods and advances.

Crime information mining can be utilized to give entire crime measurements of a


specific locale or territory that gives advantage to the general public by striking the
administration and law implementation organizations to comprehend the different
causes that expansion the crime rates. The administration and law requirement offices
can take better choices for better living of the nationals that normally mean parcel of
lives. The decision tree algorithm and Apriori algorithm that identified the data and
classify the data accordingly. Decision Tree Algorithm Pseudocode 1. Place the best
characteristic of the dataset at the base of the tree. 2. Split the preparation set into
subsets. Subsets ought to be made such that every sub- set contains information with a
similar incentive for a property. 3. Repeat stage 1 and stage 2 on every subset until the
point when you discover leaf hubs in all the branches of the tree.

Frequent pattern (item set) mining plays a key role in rule mining. service
enumeration, and vulnerability scanning. It can reveal more detailed information but
may also trigger security alerts.

The Apriori and FP development calculations are the most renowned calculations
which can be utilized for Frequent Pattern mining. his paper shows the study of
different Frequent Pattern Mining and Rule Mining calculation which can be applied
Department of Computer Engineering, BVCOE, Lavale Pune
VAPT – Bug Bounty Recon Tool 9

to crime pattern mining. The analysis of survey would provide the data about what
has been done already in a same area, what is the present trend and what are the other
related areas. Frequent Pattern mining having three important approaches that is
candidate generation approach, without candidate generation approach and vertical
layout approach. It also explains different frequent pattern calculations and how it can
be connected to various zones especially in wrongdoing design identification. This
paper helps the researchers to get clear thought towards the application of frequent
pattern mining algorithm in various areas. Crime Pattern Theory guarantees that a
crime including a wrongdoer and a casualty or target can just happen when the
movement spaces of both run into each other. Just put crime will happen if a region
gives chance to crime and it exists inside a guilty party’s mindfulness space. the audit
on different research papers relating to uses of incessant examples mining and
affiliation control mining in the field of wrongdoing design recognition. It gives
learning about different regular example mining calculation and augmentations of the
same. It additionally clarifies about the diverse application zones where these regular
examples can be utilized other than wrongdoing design.

In the daily life, crime keeps increasing and threatens the lives of the people in public.
The accuracy and time of tracing are robust while data mining technique is indulged.
The hurdle in the process starts from selecting the related variable for analysis and
their sensitiveness. The research work carried on the crime is potential area that
requires optimization. The quantum of the data and volatility makes the field
challenging. In this paper summarized the various existing techniques. The motivation
of this developed system relies on the problem faced by the police in tackling
voluminous crime.

The lack of software based on the police need, paved way to the OVER Seminar, that
aimed at managing various records of the past to address the issues. The work started
with the Microsoft Access and analyzed using Structured Query Language. Followed
by developing system that afford the mapping and visualization tools for the existing
data along with predicting perspective. The purpose of data mining is vital in all the
area and from the above works it is evident that each researcher worked on different
perspective to ensure the safety for the nation perspective. The data utilized for the
purpose is varied in nature and it is important to create a common ground for the
storing of the crime related data. The usage of the soft computing algorithms will
enhance the rate of finding the highly critical data in the shorter span of time. The
data mining techniques like classification, clustering and association rule mining is
Department of Computer Engineering, BVCOE, Lavale Pune
Data Mining For Crime Investigation 10

well serving the purpose of handing the versatile data. The effective management of
crime related data along with the optimized algorithms is the potential area of
research. Profiling the offender information then applying the data mining paves way
to understand the behavioral pattern of the criminals.

With a substantial increase in crime across the globe, there is a need for analyzing the
crime data to lower the crime rate. This helps the police and citizens to take necessary
actions and solve the crimes faster. In this paper, data mining techniques are applied
to crime data for predicting features that affect the high crime rate. Supervised
learning uses data sets to train, test and get desired results on them whereas
Unsupervised learning divides an inconsistent, unstructured data into classes or
clusters. Decision trees, Nave Bayes and Regression are some of the supervised
learning methods in data mining and machine learning on previously collected data
and thus used for predicting the features responsible for causing crime in a region or
locality. Based on the rankings of the features, the Crimes Record Bureau and Police
Department can take necessary actions to decrease the probability of occurrence of the
crime.

The crime data has many features including information about immigrants, race, sex,
population, demographics and so on. Analyzing this data not only helps in
recognizing a feature responsible for high crime rate but also helps in taking
necessary actions for prevention of crimes. Data mining provides powerful techniques
and algorithms to analyses data and extract important information from it. Criminal
network analysis, this included study of network boundaries, defining actors, its
attributes, activities, and affiliations that ensure data reliability and change over time.
He concluded that selecting the appropriate methodology depends on tasks required or
high volume of crime data to be prepared. The paper concludes with Random Forest
Classifier giving the most balanced results with respect to accuracy, precision, recall
and F1 score out of three models for prediction of ‘Per Capita Violent Crimes’ feature.
While Linear Regression gave the lowest values in these performance measures, the
data could not fit well to the straight line considered using target and remaining
features.

Crime rate is increasing very fast in India because of increase in poverty and
unemployment. With the existing crime investigation techniques, officers have to
spend a lot of time as well as man power to identify suspects and criminals. However,
crime investigation process needs to be faster and efficient. As large amount of

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 11

information is collected during crime investigation, data mining is an approach which


can be useful in this perspective. Data mining is a process that extracts useful
information from large amount of crime data so that possible suspects of the crime
can be identified efficiently. Numbers of data mining techniques are available. Use of
particular data mining technique has greater influence on the results obtained. So, the
performance of three data mining techniques J48, Nave Bayes and JRip will be
compared against sample crime and criminal database and best performing algorithm
will be used against sample crime and criminal database to identify possible suspects
of the crime. Data mining is a process of extracting knowledge from huge amount of
data stored in databases, data warehouses and data repositories. Clustering is the
process of combining data objects into groups.

The data objects within the group are very similar and very dissimilar as well when
compared to objects of other groups. Traditional crime investigation processes require
a lot of skilled man power and paperwork. There is lack in use of technology for
sensitive domain like crime investigation. So, crime investigation has become a time-
consuming process. Data mining is the process of extracting useful information or
knowledge from large data sources. Large amount of information is collected during
crime investigation process and only useful information is required for analysis. So,
data mining can be used for this purpose. Selection of particular data mining
technique has greater influence on the results obtained. This is main reason behind the
performance comparison and selection of best performing data mining algorithm.

This paper presents a proposed model for crime and criminal data analyzes using
simple k-means algorithm for data clustering and Apriori algorithm for data
Association rules. The paper tends to help specialist in discovering patterns and
trends, making forecasts, finding relation- ships and possible explanations, mapping
criminal networks and identifying possible suspects. Clustering is based on finding
relationships between different Crime and Criminal attributes having some previously
unknown common characteristics. Association rules mining is based on generate rules
from crime dataset based on frequents occurrence of patterns to help the decision
makers of our security society to make a prevention action. The data was collected
manually from some police department in Libya. This work aims to help the Libyan
government to make a strategically decision regarding prevention the increasing of
the high crime rate these days. Data for both crimes and criminals were collected from
police departments’ dataset to create and test the proposed model, and then these data
were preprocessed to get clean and accurate data using different pre-processing
Department of Computer Engineering, BVCOE, Lavale Pune
Data Mining For Crime Investigation 12

techniques (cleaning, missing values and removing inconsistency). The preprocessed


data were used to find out different crime and criminal trends and behaviors, and
crimes and criminals were grouped into clusters according to their important
attributes. WEKA mining software and Microsoft Excel were used to analyze the
given data. An acceptable model for data mining which comes up with excellent
results of analyzing crime data set; it requires huge historical data that can be used for
creating and testing the model.

The purpose of this paper is to suggest ways by which law enforcement and
intelligence agencies can analyze large volume of data using data mining as one of the
ways of getting active solutions for crime investigation in Nigeria. The problem is, the
general public are extremely concerned on how the activities of the terrorist in Nigeria
can be reduced if it cannot be completely eliminated. The results of this paper can be
significantly useful to the National Security Advisor’s office (NASAO), State Security
Service (SSS), Nigerian Police Force (NPF), Nigeria Army, including the Air Force
(NAF) and Navy, Immigration, Customs, Economic and Financial Crime Commission
(EFFC), Independent Corrupt Practices Commission (ICPC), and the general public.
Data mining will help these stakeholders to review various data mining algorithms
and then design a framework that would be automated to trigger alarm for timely
solution for prevention, arrest and investigation of crimes.

Data mining is a way to extract knowledge out of usually large data sets; in other
words, it is an approach to discover hidden relationships among data by using
artificial intelligence methods. The wide range of data mining applications has made
it an important field of research. Criminology is one of the most important fields for
applying data mining. Criminology is a process that aims to identify crime
characteristics. Actually, crime analysis includes exploring and detecting crimes and
their relation- ships with criminals. The high volume of crime datasets and also the
complexity of relationships between these kinds of data have made criminology an
appropriate field for applying data mining techniques.

Identifying crime characteristics is the first step for developing further analysis. The
knowledge that is gained from data mining approaches is a very useful tool which can
help and support police forces. An approach based on data mining techniques is
discussed in this paper to extract important entities from police narrative reports
which are written in plain text. By using this approach, crime data can be
automatically entered into a database, in law enforcement agencies. We have also

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 13

applied a SOM clustering method in the scope of crime analysis and finally we will
use the clustering results in order to perform crime matching process. In this research
some of the most significant capabilities of data mining techniques were leveraged
through a multi-purpose framework for intelligent crime investigation. The
framework exploited a systematic approach for using SOM and MLP neural networks

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 14

3. Problem Definition and scope

Problem Statement

As the crime rate is increasing day by day, many cases take too much of time to be
solved and due to insufficient resources and lack of technology provided to them many
cases which can be solved within short period of time take too much of time. To
overcome this situation, we are proposing this Seminar in which data mining techniques
and algorithms are used.

3.1.1 Goals and objectives

Goal and Objectives:

• Manually managed evidence storing using user friendly application interface.

• Storing collected evidence (data) in structured format over cloud platform.

• Analyzing and generating useful information for Investigator and Criminal

3.1.2 Statement of scope

• It takes manual data from user and store it in database.

• It does not take Dataset, but it make, one.

• Output will give suspect prediction score.

• Data can be manipulated by authorized user only.

3.2 Major Constraints

•Before going on air, suspect prediction score must be tested using the previous
dataset.

• Application will be available for Android and iOS only.

• Prediction algorithm will only predict the most suspected criminal among all suspect’s
description available in database, it cannot predict suspect whose data is not available.

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 15

3.3 Outcome

• Predictive score of each suspect that are recorded.

• Relevance of suspects with other crime.

3.4 Applications

• In crime investigation field.

• Database management.

• Crime Reporting.

3.5 Hardware Resources Required

• System: - Smart Phone

• RAM: -1 GB

• CPU Speed: - 1 GHz or higher Clock Processor

• Camera

• GPS

3.6 Software Resources Required

Platform:

1. Operating System: Android, iOS

2. Programming Language: Java, Dart.

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 16

4.Software Requirement Specification

4.1 Purpose and Scope of Document


Traditional manual process such as First Information Report (FIR) to keep and
analyze the records crime and criminals is time consuming and not efficient. We are
proposing system to make this task of recording and analyzing reports in easier and
efficient way. It can only store the record related to crime and calculate criminal
prediction based on past records available in system.

4.1.2 Overview of responsibilities of Developer

They are responsible for the design, testing and maintenance of software programs for
computer operating systems or applications, such as word processing or database management
systems.

4.2 Usage Scenario

The use case scenario considers the goal of publishing a short story. It breaks down
the process of book publishing by describing the actors, the typical work-ow in the main
success story, and the things that could go wrong, called extensions. When managing
Seminar that use UML conventions, there can be temptation to jump straight into the case
diagram, with stick figures, ovals, and lots of lines. But if you don’t know your goals and
whose involved, take a step back and write your goals down in prose.

4.2.1 User profiles

1.Admin: Admin can add the FIR with details like name, age, Crime, Place, Weapon, etc.
which are included by the application user.
2. Sub Inspector: Can view the FIR and get updates related to that particular case.
He can also update the reports by having tag on his changes

3.User: Add crime details from crime scene Use inbuilt camera to capture crime scene
photo.

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 17

4.2.2 Use Case View

Use Case Diagram.

Figure6.1: Usecase diagram

4.3 Data Model and Description


4.3.1 Data Description
A data model refers to the logical inter-relationships and data flow between
different data elements involved in the information world. It also documents the way data
is stored and retrieved. Data models facilitate communication business and technical
development by accurately representing the requirements of the information system and
by designing the responses needed for those requirements. Data models help represent
what data is required and what format is to be used for different business processes.

4.3.2 Data objects and Relationships

Data objects and their major attributes and relationships among data objects are
described using an ERD- like form.

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 18

4.4 Functional Model and Description

• A functional requirement defines the functionality of a system or one of its


subsystems. It also depends upon the type of software, expected users and the type
of system where the software is used. Functional user requirements may be high-
level statements of what the system should do but functional system requirements
should also describe clearly about the system services in detail.

• 1) GENERATING OF DATA SETS Data related to Crime is recorded by using


application, which will be stored over cloud for further processing.

• 2) DATA ANALYSIS AND USEFUL DATA GENERATION Stored data over cloud
is used to generate useful information using Data Mining techniques and Criminal
Prediction algorithms.
3) USING GENERATED DATA FOR CRIME INVESTIGATION Generated data
is used for further Investigation and stored in records for other requirements.

4.4.1 Data Flow Diagram

Data Flow Diagramming is a means of representing a system at any level of detail


with a graphic network of symbols showing data flows, data stores, data processes, and
data sources/destinations. The purpose of data flow diagrams is to provide a semantic
bridge between users and systems developers
DFD Level 0: This level shows the crime data being taken in from Police Officer. This
raw data is fed into our system, after which, the predicted values of the specified fields
are displayed as results.
DFD Level 1: This level shows us the general scheme of working of our system. First,
data is going to be fed into our system in the form of crime records. Then, these crime
records are going to be analyzed using some algorithms, after which, the predicted values
of the specified target variables will be displayed.

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 19

4.4.2 Description of functions


Activity diagram is important diagram in UML to describe the dynamic aspects
of the system. Activity diagram is basically a flowchart to represent the flow from one
activity to another activity. The activity can be described as an operation of the system.
The control flow is drawn from one operation to another. This flow can be sequential,
branched, or concurrent. Activity diagrams deal with all type of flow control by using
different elements such as fork, join, etc. It captures the dynamic behavior of the
system. It captures the dynamic behavior of the system. Activity is a particular
operation of the system. Activity diagrams are not only used for visualizing the dynamic
nature of a system, but they are also used to construct the executable system by using
forward and reverse engineering techniques. The only missing thing in the activity
diagram is the message part.

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 20

Figure 6.3: Activity Diagram


Here in the above diagram describes about the activities performed by the user
from the start step (i.e. opening of the application) to the end step (i.e. closing of the
application). Opening of the application is the very first step performed by the user
then the second step is the authentication step which consists of sign up and login
processes. Then the user (i.e. officer) choose the required feature and enters the related
information. The next activity performed is to choose service and analyzing the data
using certain data mining techniques and after that suspect prediction task is performed
using certain predictive algorithms. At last the result of the suspects is displayed on the
main user interface (UI). So, these are all the activities which are performed by the user
on the User Interface (UI).

4.4.3 Non Functional Requirements:

• PERFORMANCE REQUIREMENTS:
The performance of the system completely depends upon how quickly the system
will be able to run analysis and prepare crime patterns based on the data and the
volume of the data to be extracted. It is necessary to maintain the performance of
the system so that the results are accurate.

• SAFETY REQUIREMENTS:
The system must be safe and should not be susceptible to attacks. Attacks can
change the integrity of the data/system and result in loss of confidentiality or data
loss which can affect the system hugely.
Department of Computer Engineering, BVCOE, Lavale Pune
VAPT – Bug Bounty Recon Tool 21

• SECURITY REQUIREMENTS:
Data must be secure from unauthorized access. Data present in database is highly
confidential and related to Crime scene which should not be tempered or modified
at any cost.

• SOFTWARE QUALITY ATTRIBUTES:

Qualities like availability of the system is an important attribute since the system
should be available to use and implement whenever needed. The system should be
up and running whenever it is required for. System should run on any device with
the same efficiency, time and accuracy as the original system.

4.4.4 State Transition Diagram:

Figure 6.4: State transition diagram

A state diagram is a type of diagram used in computer science and related fields to
describe the behavior of systems. State diagrams require that the system described is
composed of a finite number of states; sometimes, this is indeed the case, while at other
times this is a reasonable abstraction. Many forms of state diagrams exist, which differ
slightly and have different semantics. A transition in a state diagram is a progression
from one state to another and is triggered by an event that is internal or external to the
entity modeled. An action is an operation that is invoked by an entity that is modeled. A
very traditional form of state diagram for a finite machine is a directed graph.

Department of Computer Engineering, BVCOE, Lavale Pune


Data Mining For Crime Investigation 22

4.4.5 Design Constraints

Any design constraints that will impact the subsystem are noted

4.4.6 Software Interface

Operating System: Android, iOS.

Programming Language:- Dart, Java.

Department of Computer Engineering, BVCOE, Lavale Pune


VAPT – Bug Bounty Recon Tool 23

5 Conclusions

Traditional crime investigation processes require a lot of skilled man power


and paperwork. There is lack in use of technology for sensitive domain like crime
investigation. So crime investigation has become a time consuming process. Data
mining is the process of extracting useful information or knowledge from large data
sources. Large amount of information is collected during crime investigation process
and only useful information is required for analysis. So data mining can be used for
this purpose. Selection of particular data mining technique has greater influence on
the results obtained. This is main reason behind the performance comparison and
selection of best performing data mining algorithm.

Department of Computer Engineering, BVCOE, Lavale Pune


6. References

[1] Dr. Ritu Bhargava, Pramod Singh, Rameshwar Singh Sangwa. ANALYSIS OF
CRIME DATA USING DATA MINING ALGORITHM.

[2] K.S.N.Murthy, A.V.S.Pavan Kumar, Gangu Dharmaraju. ANALYSIS OF CRIME


DATA USING DATA MINING.

[3] R.Sujatha, Dr.Ezhilmaran. A COMPARATIVE STUDY ON PREDICTION OF


CRIME PATTERNS.

[4] Prajakta Yerpude, Vaishnavi Gudur. PREDICTIVE MODELLING OF CRIME


DATASET USING DATA MINING.

[5] S.R.Deshmukh , Arun S. Dalvi , Tushar J .Bhalerao , Ajinkya A. Dahale , Rahul S.


Bharati ,Chaitali R. Kadam. CRIME INVESTIGATION USING DATA MINING.

[6] Dr. Zakaria Suliman Zubi, Ayman Altaher Mahmmud. CRIME DATA ANALYSIS
USING DATA MINING TECHNIQUES TO IMPROVE CRIMES PREVENTION.

[7] Uddin, Osemengbe O., P. S. O. Uddin. DATA MINING: AN ACTIVE SOLUTION


FOR CRIME INVESTIGATION.

[8] MohammadRezaKeyvanpoura , Mostafa Javidehb , Mohammad Reza Ebrahimia.


DETECTING AND INVESTIGATING CRIME BY MEANS OF DATA MINING:
A GENERAL CRIME MATCHING FRAMEWORK.
Data Mining For Crime Investigation 25

7. Report Documentation

Seminar Report Documentation

Report Code: CS-TE-Seminar 2023-2024 Report Number: 44

Report Title: DATA MINING FOR CRIME INVESTIGATION

Address:

Bharati Vidyapeeth’s College of Engineering, Lavale, Pune.

Pin – 412 115, M.S. INDIA.

Author: Mr. Amol Shahadev Funde

Address: Pooja Niwas, Gujarat Colony, Kothrud, Pine – 412115

E-mail: [email protected]

Roll: 44

Cell No: +91 9022967272

Year: 2023 – 2024

Branch: Computer Engineering

Key Words: Bug Bounty, Recon, Google Dorking

Type of Report Report Guides Complete Total Copies


Report: Checked By Checked Name:
FINAL (sign): Date: 2
Prof. Pratima Kadam
Mam

Abstract:

Vulnerability Crime rate is increasing very fast in India. With the existing crime investigation
techniques, occurs have to spend a lot of time as well as man power to identify suspects and criminals. As
large amount of information is collected during crime investigation, data mining is an approach which can
be useful in this perspective. Data mining is a process that extracts useful information from large amount of
crime data so that possible suspects of the crime can be identified efficiently. Best performing algorithm will
be used against sample crime and criminal database to identify possible suspects of the crime.

Department of Computer Engineering, BVCOE, Lavale Pune

You might also like