FinalInterim
FinalInterim
Abstract: Crimes are one of the major threat to the society and also for the civilization. The traditional crime solving
techniques unable to live up to the requirement of existing crime scenario. Most challenging area in this crimes is
identifying the sets of crimes committed by the same individual or same group. Criminal are humans. Then they tend to
do the same work in the same way. Surveys states that 50% of the crimes done by the 10% of criminals. In this scenario
Machine Learning can be used to identify the patterns of crimes. The data to feed this Machine Learning approach can
be taken from past crime records, social media sentiment analysis, weather data etc. There are five steps in crime
prediction by using Machine Learning. Those are data collection, data classification, pattern identification, prediction
and visualization. The limited resources in law enforcement authorities can be used effectively by using crime prediction
methods. Especially data collected through the social media shows that prediction of a crime can be done using Machine
Learning and it shows reasonable percentage of hits.
1
habits that the offender follows, and is a type of motif used
to characterize the pattern. As more crimes are added to the
III. METHODOLOGY set, the M.O. becomes more well-defined. Following 21
Data Collection characteristics have been extracted as MO table to their
research.
The data collection has been done for crime prediction by
using two major data sources. Those are
Crime data records from law enforcement authorities
Social media analysis
IoT devices
The largest data set maintained by a law enforcement
authority is “Crime data 2001 to present” [5] by Chicago
Police department. There are significant number of Crime
Prediction systems tested in Chicago city. [6]
In Sri Lanka these data can be collected from Criminal
Records Office (CRO), but those are not in digital format.
Because of that reason it is mandatory to convert those
written files to digital format before use.
REFERENCES
[1] “Types of Crimes - Overview and Discussion.”
[Online]. Available: https://www.thoughtco.com/types-of-
crimes-3026270. [Accessed: 22-Jun-2017].
[2] M. Munasinghe, H. Perera, S. Udeshini, and R.
Weerasinghe, “Machine Learning based criminal short
listing using Modus Operandi features,” 2015, pp. 69–76.
[3] “Predict Crime | Predictive Policing Software,”
PredPol. [Online]. Available: http://www.predpol.com/.
[Accessed: 22-Jun-2017].
[4] S. Aghababaei and M. Makrehchi, “Mining Social
Media Content for Crime Prediction,” in Web Intelligence
(WI), 2016 IEEE/WIC/ACM International Conference on,
2016, pp. 526–531.
[5] “Crimes - 2001 to present - Data.gov.” [Online].
Available: https://catalog.data.gov/dataset/crimes-2001-to-
present-398a4. [Accessed: 24-Jun-2017].
[6] M. Wang and M. S. Gerber, “Using Twitter for Next-
Place Prediction, with an Application to Crime Prediction,”
2015, pp. 941–948.
[7] X. Chen, Y. Cho, and S. Y. Jang, “Crime prediction
using Twitter sentiment and weather,” in Systems and
Information Engineering Design Symposium (SIEDS),
2015, 2015, pp. 63–68.
[8] W. Gorr, A. Olligschlaeger, and Y. Thompson, “Short-
term forecasting of crime,” Int. J. Forecast., vol. 19, no. 4,
pp. 579–594, 2003.
[9] T. Aljrees, D. Shi, D. Windridge, and W. Wong,
“Criminal pattern identification based on modified K-means
clustering,” in Machine Learning and Cybernetics
(ICMLC), 2016 International Conference on, 2016, vol. 2,
pp. 799–806.
[10] X. Zheng, Y. Cao, and Z. Ma, “A mathematical
modeling approach for geographical profiling and crime
prediction,” in Software Engineering and Service Science
(ICSESS), 2011 IEEE 2nd International Conference on,
2011, pp. 500–503.
[11] S. Sathyadevan, S. Gangadharan, and others, “Crime
analysis and prediction using data mining,” in Networks &
Soft Computing (ICNSC), 2014 First International
Conference on, 2014, pp. 406–412.
[12] A. Babakura, M. N. Sulaiman, and M. A. Yusuf,
“Improved method of classification algorithms for crime
prediction,” in Biometrics and Security Technologies
(ISBAST), 2014 International Symposium on, 2014, pp.
250–255.