Article3
Article3
Indian Journal of Science and Technology, Vol 10(40), DOI: 10.17485/ijst/2017/v10i40/120079, October 2017 ISSN (Online) : 0974-5645
Abstract
Objectives: This paper proposes a framework that transforms the structural crime related data into effective visual reports
to strengthen the pro-active activities of law enforcement agencies. Methods/Statistical Analysis: The information
visualization depends on the input data. The visualization engine, as proposed in this research work, processes all the
data to produce crime information instrumental for the law-enforcing agencies and present it in three different formats:
1) Statistically summarized reports in graphical formats, 2) Heat-maps of crimes and 3) Clusters of crime patterns
based on geo-locations. Findings: The visual crime analysis information may also help the policy-makers to gain depth
knowledge about crime types, their timings at certain regions. This insight knowledge may improve the performance of
law enforcement agencies in reducing crime rate and utilizing resources efficiently. Especially, it performs comprehensive
processing of crime information to detecting heat-maps of crimes, clustering crime patterns and presenting it by means of
information visualization techniques. Application/Improvements: Law enforcement agencies can use the system to have
comprehensive, consolidated and chronologically view of all types of reported criminal activities.
geographical locations of their occurrence is called crime for crime analysis. The proposed framework has been
mapping. Crime mapping is a comprehensive and effec- comprehensively described in section 4. The research
tive approach to illustrate the criminal offenses5. This assumptions and constraints are reported in section 5.
research takes it to the next level where the geographical The detailed discussion of the outcomes of the proposed
locations and details of crime are processed to produce framework is reported in section 6 and finally section 6
knowledge for law-enforcement agencies. draws conclusions.
2 Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology
Samiullah Shah, Vijdan Khalique, Salahuddin Saddar and Naeem A. Mahoto
son behind the level of different crime rates in two visualization methods available. This research work uses
different locations. tables, line charts, pie charts, bar charts and area charts.
• Much research work has been done on crime Data represented in this format can be viewed statically,
analysis, which highlights the importance of since data is organized presenting it to end-user.
this area. Crime detection and criminal identi-
fication in India using data mining techniques is Information Visualization: Information visualization is
proposed10. The approach to detect criminals and the representation of processed form of data. Information
crimes has been addressed using different data visualization usually consists of the ways, where inter-
mining techniques. activity with the information, can be ensured. The
• Finding intensity level of crime from minimum interaction allows transforming the look & feel of the
to high scale and presenting that information on overall representation of the information. This research
geo-map in shape of clusters is reported8. The work uses data maps and clustering techniques for repre-
study uses five spatio-temporal pattern analysis sentation of information.
techniques.
• Aoristic signatures and the Spatio-Temporal Concept Visualization: The representation of qualitative
analysis of high volume crime patterns11 is used concepts, ideas, plans analyses is called concept visual-
to identify the patterns of crimes based on time- ization. This technique comprises of mind maps, layer
stamp in order to predict the times of crimes. charts, cause-effect chain and others.
Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology 3
A Framework for Visual Representation of Crime Information
figures. The aim of this research is to provide a more read- application, which has been developed implementing the
able, comprehensible and customizable crime patterns. proposed framework.
Especially, line charts, bar charts, pie charts and area Furthermore, the longitude and latitude for geo-
charts have been considered to illustrate the information locations are unavailable in the structural database as
in this research. Besides, data maps with clustering are shown in Figure 1. Therefore, clustering crime patterns
applied for in-depth knowledge to better understand the over Google-Maps needs to be done using additional
crime patterns. processing to achieve the longitude and latitude of the
regions reporting crimes in the database. In particu-
lar, reported addresses of the crimes are fetched from
4. The Proposed Framework database and are processed in order to obtain their lon-
The architecture of the proposed framework is presented gitude and latitude using Google-Maps API (Application
in Figure 2. The major components of the framework Programming Interface). The clustering patterns com-
are 1) Data Center Module, 2) Controller Module and 3) ponent group together the similar crime types with their
Data Presentation Module. intensities and convert the processed data into JSON (i.e.
The details of each component are reported in the follow- JavaScript Object Notation) object for visualizing the
ing. crime patterns at geo-locations. Thus, three different for-
mats: i) statistically summarized information in graphs, ii)
1) Data Center Module heat-maps of the crimes and iii) clusters of crime patterns
This module is responsible for the creation of the data- located at certain regions are sent to Data Presentation
base. The module allows law enforcement officials to store Module.
the First Information Reports (FIRs) (i.e., crime reports).
The FIR contains information about the crime containing 3) Data Presentation Module
the location and area where the crime has taken place, Data presentation module is the front-end for end-user in
data and time of occurrence of crime, date and time of order to visualize the crime related information in inter-
crime report and the type of crime. Though the FIRs are active and effective manner. Statistically summarized
in the unstructured data format (Data format that does information is presented in the form of line chart, pie chart,
bar chart (see Figure 6-12). The heat-maps for the crimes
not have certain schema e.g., textual data), this module
at certain timestamp are reported in hotspots (see Figure
preprocesses the data and transforms into the structural
3 and Figure 4). Similarly, clusters at certain location of
data format. For instance, crime related data such as
crime patterns are visually presented (see Figure 5).
crime type, timestamp, date, longitudes and latitudes that
represent certain location of crimes are transformed into
System Security Mechanism
structural format. Finally, it stores the processed data into
The proposed framework ensures the security of the
relational database. The schema of the database is illus- data, since crime related data are always key concerns of
trated in Figure 1 . law enforcement agencies. The system security has been
ensured with implementing the state of the art technology
2) Controller Module of Intranet Security Mechanism. The system offers cus-
This module is the heart of the proposed framework, tom security layers and Intranet Security Mechanism is a
which performs the following tasks: a) Extracting struc- closed network.
tured data from database, b) Transforming structured Further, private Internet Protocols (IPs) of certain
data into statistically visual graphs, c) Detecting hotspots Class (Class A, Class B, and Class C) have been allowed to
(i.e., heat-maps) of crimes and d) Injecting clustering communicate with the Data Center Module. Thus, creat-
approach to identify the clusters of crime patterns. ing a private Hub of connectives. This mechanism secures
The detection of heat-maps is carried out based on the system from World Wide Web.
timestamp of the stored crime related data in the data-
base. The data is fetched from database and is processed The three-layer security is described as follows.
to produce heat-maps presenting the intensity of the Layer 1: In this layer, the system allows only authorized
crime within certain region. The region selection, time- private request and denies all requests for accessing the
stamp and crime types are the provisions of the prototype system from other networks.
4 Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology
Samiullah Shah, Vijdan Khalique, Salahuddin Saddar and Naeem A. Mahoto
Layer 2: This layer deploys firewall on the computer of crimes categorically. For the pattern analysis of crime,
machine where database is stored. Thus denying access a 2-dimension model is condensed to analyze patterns
of all IPs other than the IPs of authorized system’s class. of crimes by day-hour. The research contribution is dis-
Layer 3: An additional custom design firewall has been cussed in the following.
deployed on the data center machine, which compares all
local IPs, private IPs and physical addresses of all incom-
ing requests of users. In case any mismatch occurs, the
request is turned down and physical address of the user
is blacklisted. Thus this layer ensures extra-security mea-
sures to keep the data secure.
5. Research Assumptions
To acquire the authentic data about registered criminal
activities, law enforcement agencies were contacted. Due
to security and confidentiality of the data, officials refused
to share such data in any form (print or electronic).
However, they cooperated informally to build mechanism Figure 4. Heat map for snatching.
of synthetic data generation. The data has been manually
entered in the system based on the statistics informally 6.2 Live Heat Map
shared by law enforcement officials. Therefore, the reports Crime can take place anywhere at any time. Changing rate
presented in this research are based on hypothetical data of crime affects the crime analysis eventually resulting in
but illustrates the figures in exactly the same way it would wrong decision-making. Therefore, live heat maps show
represent when provided with the actual data about the exclusive and live details about the current situation
crime. Since the main objective of this paper is presenting of criminal activities. Figure 3 illustrates the heat map
an idea about how to represent crime data in the form of for robbery. Whenever any robbery takes place, provided
live statistics and graphical components. Thus, the pres- that the robbery has been registered timely.
ence of actual data is not the main requirement for this
paper. The dummy data serves well to show overall work-
ing and concept of this paper.
6. Discussion
Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology 5
A Framework for Visual Representation of Crime Information
Time based live heat maps may also help the adminis-
tration to make better decision and take necessary actions
based on identified times at certain regions; for example,
deployment of higher number of patrolling officers at cer-
tain regions at specific time.
6 Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology
Samiullah Shah, Vijdan Khalique, Salahuddin Saddar and Naeem A. Mahoto
6.4 Consolidation of Structured Data about data can be organized to increase the knowledge of
Crime decision makers. Thus, this will result in effective and
beneficial decision-making approaches.
In addition to live crime reporting and heat maps, the The proposed system provides the summary reports
proposed research presents the crime reports in single covering numerous dimensions, as mentioned. The pie chart
coherent interface. These consolidated reports provide in Figure 8 illustrates summary reports obtained in the pro-
the summary of all the criminal activities over the year posed framework. Likewise, Figure 9 to Figure 12 present
according to the number of their occurrences (frequen- the summary reports in bar chart format for region-wise
cies). The crime reports show the annual crime rate of comparative, city-wise comparisons, city-based annual, per
certain region as shown in Figure 6. Similarly, Figure 7 anum and monthly comparative reports respectively.
represents annual crime report in bar chart.
Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology 7
A Framework for Visual Representation of Crime Information
ACM SIGKDD Workshop on Interactive Data Exploration 11. Ratcliffe JH. Aoristic signatures and the spatio-tempo-
and Analytics. ACM, 2013 August; p. 71-8. Crossref. ral analysis of high volume crime patterns. Journal of
2. Jayaweera I, Sajeewa C, Liyanage S, Wijewardane T, Perera Quantitative Criminology. 2002; 18(1):23-43. Crossref.
I and Wijayasiri A. Crime analytics: Analysis of crimes 12. Yaksic Vera, Nelson Fabian. Crime Prevention Through
through newspaper articles. IEEE, Moratuwa Engineering Environmental Design. Master of City and Regional
Research Conference (MERCon). 2015 April; p. 277-82. Planning Terminal Projects. 2016; 70.
Crossref. 13. Eck John E and Weisburd David L. Crime Places in Crime
3. Weisburd DL and McEwen T. Introduction: Crime map- Theory. Crime and Place: Crime Prevention Studies.
ping and crime prevention. 2015. Hebrew University of Jerusalem Legal Research Paper. 2015
4. Ku CH, Nguyen JH and Leroy G. Tasc-crime report visu- July 12; 4:1-33.
alization for investigative analysis: A case study. 2012 IEEE 14. Weisburd David L and McEwen Tom. Introduction: Crime
13th International Conference on Information Reuse and Mapping and Crime Prevention. 2015 July 12. Available
Integration (IRI). IEEE, 2012 August; p. 466-73. Crossref. at SSRN: https://ssrn.com/abstract=2629850 or Crossref.
5. Ansari SM and Kale K. Methods for Crime Analysis Using Crossref.
GIS. International Journal of Scientific and Engineering 15. Zhang Y, Bellamy RK and Kellogg WA. Designing informa-
Research. 2014; 5:1330-6. tion for remediating cognitive biases in decision-making.
6. Tayal DK, Jain A, Arora S, Agarwal S, Gupta T and Tyagi N. Proceedings of the 33rd Annual ACM Conference on
Crime detection and criminal identification in India using Human Factors in Computing Systems. ACM, 2015; p.
data mining techniques. AI and SOCIETY. 2015; 30(1):117- 2211-20. Crossref.
27. Crossref. 16. Card SK, Mackinlay JD and Shneiderman B., editors. San
7. Bates E and Mackaness W. Understanding Spatio Temporal Francisco, CA, USA: Morgan Kaufmann Publishers Inc.:
Patterns of Crime Using Hotspot AND Coldspot Analysis. Readings in Information Visualization: Using Vision to
2015. Think. 1999.
8. Leong Kelvin and Anna Sung. A review of spatio-temporal 17. Burkhard Remo Aslak. Strategy visualization: A new
pattern analysis approaches on crime analysis. International research focus in knowledge visualization and a case study.
E-journal of Criminal Sciences. 2015; 9. Proceedings of I-KNOW. 2005; 5. PMCid:PMC1242239.
9. Ratcliffe JH. The hotspot matrix: A framework for the spa- 18. Eppler Martin J and Ken W Platts. Visual strategizing: the
tio‐temporal targeting of crime reduction. Police Practice systematic use of visualization in the strategic-planning
and Research. 2004; 5(1):5-23. Crossref. process. Long Range Planning. 2009; 42.1:42-74. Crossref.
10. Chen H, Chung W, Xu JJ, Wang G, Qin Y and Chau M.
Crime data mining: a general framework and some exam-
ples. Computer. 2004; 37(4):50-6. Crossref.
8 Vol 10 (40) | October 2017 | www.indjst.org Indian Journal of Science and Technology