SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 34
Online Crime Reporting and Management System using Data Mining
Pradnya Ogale1, Mayuri Chormale2, Pinaki Babar3, Shridhar Shinde4
1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041,
Maharashtra, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The aim of this project is to develop an online
managing crime report system which is accessible to the
common public and the police department easily. The system
provides users with the information about the crime rates ofa
desired area. This is useful for tourists who are entering in an
unvisited area. If the user enters in 100 meter radius of a high
alert area then he/she will be notified with an alert message.
The user gets notified about the different crime rates in the
area and can provide the safest path to the desired
destination. Also, the system registers the complaintsfromthe
people through online web application where they canupload
images and videos of the crime and it will be helpful for the
police department in catching criminals. The person can give
complaint at any time.
Key Words: KNN Algorithm, AES Algorithm, K-Means
Algorithm.
1. INTRODUCTION
Crime is a part of illegal activities in human life. The rise of
population and complex society rises the rangeofanti-social
conducts that must be restricted by thegovernmentthrough
the military and different organizations particularly the
Police Force. There are many current crime management
systems which faces several difficulties, as thereisnomeans
to report crime instantly other than phone calls, messaging
or face-to-face compliant filing. Hence, we have proposed an
online crime reporting system which allows the user to file
complaints or missing reports and keep a track of it. There
are 3 categories that a user can file; Complaint,CrimeReport
and Missing Report and can see all the status of what action
has been taken by the admin. To file any of the above 3
complaints, the user should register in to the system and
provide his right credentials to file them. The crime
reporting system projectalsoallowsotheruserswhodoesn’t
want to register but can check the crimes happening at
his/her or any other area, has to just provide the pin code
and in return the system displays the list of crimes if any
filed. The offline i.e. the unregistered user can also take
advantage of checking the missingpersondetails,buthe/she
is refrained from getting complaints done by the users. The
Front End of the crime reporting system is done using
Android Studio and SQL serves as a backend to store books
lists and inventory data. The system, has both the user as
well the Admin Part, the role of admin is to just check all the
3 modules or categories and update their status likewise.
This system helps the users in tracking any report filed to
the law and take an advantage of reporting any complaint
from anywhere bringing the whole system online.
1.1 Literature Survey
1. Sunil Yadav illustrate that how social development
may lead to crime prevention so that toincreasethe
predictive accuracy supervised, semi-supervised
and unsupervised learning technique are used and
also k-means is used to create number of clusters.
2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi
have analysed, the main objective of this paper is to
classify clustered crimes based on occurrence
frequency during different years. Data mining is
used extensively in terms of analysis, investigation
and discovery of patternsfor occurrenceofdifferent
crimes.
3. Shyam Varan Nath have used the clustering
algorithm for a data mining approach to help detect
the crimes patterns and speed up the process of
solving crime. We will look at k-means clustering
with some enhancements to aid in the process of
identification of crime patterns.
2. Project Overview
The crime rates accelerate continuously and the crime
patterns are constantly changing. According to National
CrimeRecordsBureau,crimeagainstwomenhassignificantly
increased in recent years. It has becomethe most prior tothe
administration to enforce law and order to reduce this
increasing rate of the crime against women. We illustrates
how social development may lead tocrimeprevention.Sowe
are developing the system which can used to detect and
predict the crimes for the area where the person or user
currently stand. Crime detection and analysis will be to
generate the crime hot-spots that will help in deployment of
police at mostly likely places of crimeforanywindowoftime,
to allow most effective utilization of police resources. The
developed model will reduce crimes and will help the crime
detection field in many ways that is from arresting the
criminals to reducing the crimes by carrying out various
necessary measures. We add the woman safety module for
security. When women press the power button of android
mobile 3 to 4 times then help message send to relatives or
police. Due to this we reduce crime in the society and in
country. Here we use module of crime capture means user
can capture the photo of crime send topolice.
There is user or actors which are as follows,
1. User has theaccountandforaccessingthathe/shemust
be provide the correct username and password.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 35
2.Alluse-casesforthesoftwarearepresented. Description
of all main Use cases use case template is to be provided.
3. A use case diagram in the Unified Modeling Language
(UML) is a type of behavioraldiagram definedbyandcreated
from a Use-case analysis. Itspurpose is to presentagraphical
overview of thefunctionalityprovidedbyasystemintermsof
actors, their goals (represented as use cases), and any
dependenciesbetweenthoseusecases. Themainpurposeofa
use case diagram is to show what system functions are
performed for which actor. Roles of the actors in the system
can be depicted.
[A]AES Encryption Process
AES is an iterative rather than Feistel cipher. It is based on
substitution permutation network. Itcomprises ofa series of
linked operations, some of which involvereplacing inputs by
specific outputs (substitutions) and others involve shuffling
bitsaround(permutations). Interestingly,AESperformsallits
computations on bytes rather than bits. These 16 bytes are
arranged in four columns and four rows for processing as a
matrix. Unlike DES, the number of rounds in AES is variable
and depends on the length of the key. Each of these rounds
uses a different 128-bit round key, which is calculated from
the original AES key. In present day cryptography, AES is
widely adopted and supported in both hardware and
software. Till date, no practical cryptanalytic attacks against
AES have been discovered. Additionally, AES has built-in
flexibility of key length, which allows a degree of future-
proofingagainstprogressintheability to perform exhaustive
key searches. However, just as for DES, the AES security is
assured only if it is correctly implemented and good key
management is employed. The encryption process uses a set
ofspeciallyderivedkeyscalledroundkeys. Theseareapplied,
along with other operations, on an array of data that holds
exactlyoneblockofdata? thedatatobeencrypted.Thisarray
we call the state array.
You take the following AES stepsofencryptionfor128-bit
block:
• Derive the set of round keys from the cipher key.
• Initialize the state array with the block data
(plaintext).
• Add the initial round key to the starting state array.
• Perform nine rounds of state manipulation.
Fig-1: AES Algorithm
The reason that the rounds have been listed as “nine
followed by a final tenth round” is because the tenthround
involves a slightly different manipulation from the others.
Theblocktobeencryptedisjusta sequence of 128bits.AES
works with byte quantities so we first convert the 128 bits
into 16 bytes. We say “convert,” but, in reality, it is almost
certainly stored this way already. Operations in RSN/AES
are performed on a two-dimensional byte array of four
rows and four columns. At the start of the encryption, the
16 bytes of data, numbered D0 ? D15, are loaded into the
array as shown in following
Table A. Each round of the encryption process requires
a series of steps to alter the statearray. These stepsinvolve
four types of operations called:
1. SubBytes
2. ShiftRows
3. MixColumns
[B]Data Mining
Data mining is a new technology, which helps organizations
to process data through algorithms to uncover meaningful
patterns and correlations from large databases that
otherwise may not be possible with standard analysis and
reporting. Data mining tools can helps to understand the
business better and also improve future performance
through predictive analysis and make them proactive and
allow knowledge driven decisions. Issues related to
information extraction fro large databases, data miningfield
brings together methods from several domainslikeMachine
Learning, Statistics, Pattern Recognition, Databases and
Visualizations. Data Mining fields find its application in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 36
market analysis and, managementlikefor examplecustomer
relationship, management, cross selling, market
segmentation. It can also be used in risk analysis and
management for forecasting, customer retention, improved
underwriting, quality control, competitive analysis and
credit scoring.
[C]System Architecture
Fig:2 System Architecture
[D]Feasibility Analysis
Np-hard Np-Complete:
• What is P?
P is set of all decision problems which can be solved in
polynomial time by a deterministic.
Since it can be solved in polynomial time, it can be verified
in polynomial time.
Therefore P is a subset of NP.
P: Crime is a matter of major concern to society, it must be
checked. Although crime, being an integral part of
civilization, it can definitely be kept within limits. The task
of maintaining peace and order is delegated internally to
the police.
What is NP?
“NP” means “we can solve it in polynomial time if we can
break the normal rules of step-by-step computing”.
What is NP Hard?
A problem is NP-hard if an algorithm for solving it can be
translated into one for solving any NP-problem
(nondeterministic polynomial time) problem. NP-hard
therefore means” at least as hard as any NP-problem,”
although it might, in fact, be harder.
NP-Hard: It would be very difficult to only go through the
manual process of crime reporting to police portal.
So here in this case the P problem is NP hard.
i.e. P=NP-Hard
What is NP-Complete?
 Since this amazing ”N” computer can also do anythinga
normal computer can, we know that ”P” problems are
also in ”NP”.
 So, the easy problems are in ”P” (and ”NP”), but the
really hard ones are *only* in ”NP”, and they are called
”NP-complete”.
 It is like saying there are things that People can do
(”P”), there are things that Super People
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 37
can do (”SP”), and there are things *only* Super People can
do (”SP-complete”).
NP-Complete: Crime detection and analysis will be to
generate the crime hot-spots that will help in deployment of
police at most likely places of crime for anygiven window of
time, to allow most effective utilization of police resources.
[E]K – Nearest Neighbor NP Analysis
K–Nearest Neighbor algorithm is a Machine Learning
Classification Technique. Itis usedtoclassifya givenelement
into one of the classes which is closest to the element.
Consider a data set of ‘n’ samples and ‘d’ dimensions. There
is a point of interest whose class we want to determine on a
two-dimensional plot. We calculatethedistance betweenthe
point of interest to all other points in the data set.. If the data
set is small with less number of dimensions, this algorithm
runs in a reasonable amount of time. Since the time
complexity of K–Nearest Neighbor algorithm using Brute
Force Approach is the algorithm runs in polynomial time
and hence fall under P class of Problems.
3. CONCLUSION
The developed model will help reduce crimes and will help
the crime detection field in many ways that is from arresting
the criminals to reducing the crimes by carrying out various
necessary measures. The project is helpful forgeneral public
in getting information about the crime status of the area and
get a safe path to a desired destination.
REFERENCES
[1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis
using k-means clustering, International Journal ofComputer
Applications, Vol. 83 – No4, December 2013.
[2] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, Jim Gray, Series Editor Morgan Kaufmann
Publishers, August 2000.
[3] P. Berkhin, ―Survey ofclusteringdata miningtechniques,
In: Accrue Software, 2003.
[4] W. Li, ―Modified k-means clustering algorithm, IEEE
Congress on Image and Signal Processing, pp. 616- 621,
2006.
[5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al-
Jabbouli, Data clustering using the Bees algorithm,
proceedings of 40th CRIP International Manufacturing
Systems Seminar, 2006.
[6] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, 2nd Edition, Morgan Kaufmann Publisher,2001.

More Related Content

What's hot (20)

PPTX
Crime Management System final year project
Beresa Abebe
 
PPTX
Crime file system
deva491
 
PPTX
Android based crime manage system proposal
Beresa Abebe
 
DOCX
Crime report
Adarsh Uttarkar
 
PPTX
CRMS
Muhammad Bilal
 
PPTX
Project Report On Online Crime Management Application
satvirsandhu9
 
PPTX
ppt on e crime management system
Krishna Kinkar Jha
 
PPT
Crime filterd(ppt)
Nidhi Singh
 
PPT
Secure crime identification system
Sameer Telikicherla
 
PDF
Criminal Record Management System in the Perspective of Somalia
fowzi mohamed
 
DOCX
Report police - 6 month training project
Janella
 
PPT
Crime record
Rishitha Reddy
 
DOCX
Crime
Govind Naik
 
PPTX
Crime investigation system
Deepa Rani
 
PPTX
Online FIR System in KPK
Ashir Iqbal
 
PPTX
Criminal Record Management
Khokan Sardar
 
PPTX
Project
swapoonam
 
PDF
Online Voting System-using Advanced Java
Sarthak Srivastava
 
PPTX
Online voting system presentation slide (1)
wasi0013
 
Crime Management System final year project
Beresa Abebe
 
Crime file system
deva491
 
Android based crime manage system proposal
Beresa Abebe
 
Crime report
Adarsh Uttarkar
 
Project Report On Online Crime Management Application
satvirsandhu9
 
ppt on e crime management system
Krishna Kinkar Jha
 
Crime filterd(ppt)
Nidhi Singh
 
Secure crime identification system
Sameer Telikicherla
 
Criminal Record Management System in the Perspective of Somalia
fowzi mohamed
 
Report police - 6 month training project
Janella
 
Crime record
Rishitha Reddy
 
Crime investigation system
Deepa Rani
 
Online FIR System in KPK
Ashir Iqbal
 
Criminal Record Management
Khokan Sardar
 
Project
swapoonam
 
Online Voting System-using Advanced Java
Sarthak Srivastava
 
Online voting system presentation slide (1)
wasi0013
 

Similar to IRJET- Online Crime Reporting and Management System using Data Mining (20)

PDF
IRJET - Reporting and Management System for Online Crime
IRJET Journal
 
PDF
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
PDF
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
 
PDF
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
PDF
IRJET- Detecting Criminal Method using Data Mining
IRJET Journal
 
DOCX
Crime rate analysis using k nn in python
CloudTechnologies
 
PPTX
CRIME.pptx
ParthBhadani3
 
PDF
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
 
PDF
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
 
PDF
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
 
PDF
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
PDF
Crime
Daniel John
 
PPTX
Crime Analysis using Data Analysis
Chetan Hireholi
 
PPTX
Case.pptx
ParthBhadani3
 
PDF
Crime Data Analysis, Visualization and Prediction using Data Mining
Anavadya Shibu
 
PDF
The International Journal of Engineering and Science (IJES)
theijes
 
PDF
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
 
PDF
IRJET- Crime Prediction System
IRJET Journal
 
PDF
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
DOCX
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
IRJET - Reporting and Management System for Online Crime
IRJET Journal
 
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
 
IRJET- Detecting Criminal Method using Data Mining
IRJET Journal
 
Crime rate analysis using k nn in python
CloudTechnologies
 
CRIME.pptx
ParthBhadani3
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
Crime Analysis using Data Analysis
Chetan Hireholi
 
Case.pptx
ParthBhadani3
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Anavadya Shibu
 
The International Journal of Engineering and Science (IJES)
theijes
 
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
 
IRJET- Crime Prediction System
IRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PPTX
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PDF
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
PDF
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
PPTX
darshai cross section and river section analysis
muk7971
 
PPTX
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
PDF
Electrical Machines and Their Protection.pdf
Nabajyoti Banik
 
PDF
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PPTX
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
PPTX
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
PDF
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
PPTX
Basics of Electrical Engineering and electronics .pptx
PrabhuNarayan6
 
PPTX
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
PDF
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PPTX
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Explore USA’s Best Structural And Non Structural Steel Detailing
Silicon Engineering Consultants LLC
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
Artificial Neural Network-Types,Perceptron,Problems
Sharmila Chidaravalli
 
darshai cross section and river section analysis
muk7971
 
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
Electrical Machines and Their Protection.pdf
Nabajyoti Banik
 
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 
Basics of Electrical Engineering and electronics .pptx
PrabhuNarayan6
 
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 

IRJET- Online Crime Reporting and Management System using Data Mining

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 34 Online Crime Reporting and Management System using Data Mining Pradnya Ogale1, Mayuri Chormale2, Pinaki Babar3, Shridhar Shinde4 1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The aim of this project is to develop an online managing crime report system which is accessible to the common public and the police department easily. The system provides users with the information about the crime rates ofa desired area. This is useful for tourists who are entering in an unvisited area. If the user enters in 100 meter radius of a high alert area then he/she will be notified with an alert message. The user gets notified about the different crime rates in the area and can provide the safest path to the desired destination. Also, the system registers the complaintsfromthe people through online web application where they canupload images and videos of the crime and it will be helpful for the police department in catching criminals. The person can give complaint at any time. Key Words: KNN Algorithm, AES Algorithm, K-Means Algorithm. 1. INTRODUCTION Crime is a part of illegal activities in human life. The rise of population and complex society rises the rangeofanti-social conducts that must be restricted by thegovernmentthrough the military and different organizations particularly the Police Force. There are many current crime management systems which faces several difficulties, as thereisnomeans to report crime instantly other than phone calls, messaging or face-to-face compliant filing. Hence, we have proposed an online crime reporting system which allows the user to file complaints or missing reports and keep a track of it. There are 3 categories that a user can file; Complaint,CrimeReport and Missing Report and can see all the status of what action has been taken by the admin. To file any of the above 3 complaints, the user should register in to the system and provide his right credentials to file them. The crime reporting system projectalsoallowsotheruserswhodoesn’t want to register but can check the crimes happening at his/her or any other area, has to just provide the pin code and in return the system displays the list of crimes if any filed. The offline i.e. the unregistered user can also take advantage of checking the missingpersondetails,buthe/she is refrained from getting complaints done by the users. The Front End of the crime reporting system is done using Android Studio and SQL serves as a backend to store books lists and inventory data. The system, has both the user as well the Admin Part, the role of admin is to just check all the 3 modules or categories and update their status likewise. This system helps the users in tracking any report filed to the law and take an advantage of reporting any complaint from anywhere bringing the whole system online. 1.1 Literature Survey 1. Sunil Yadav illustrate that how social development may lead to crime prevention so that toincreasethe predictive accuracy supervised, semi-supervised and unsupervised learning technique are used and also k-means is used to create number of clusters. 2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi have analysed, the main objective of this paper is to classify clustered crimes based on occurrence frequency during different years. Data mining is used extensively in terms of analysis, investigation and discovery of patternsfor occurrenceofdifferent crimes. 3. Shyam Varan Nath have used the clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. 2. Project Overview The crime rates accelerate continuously and the crime patterns are constantly changing. According to National CrimeRecordsBureau,crimeagainstwomenhassignificantly increased in recent years. It has becomethe most prior tothe administration to enforce law and order to reduce this increasing rate of the crime against women. We illustrates how social development may lead tocrimeprevention.Sowe are developing the system which can used to detect and predict the crimes for the area where the person or user currently stand. Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at mostly likely places of crimeforanywindowoftime, to allow most effective utilization of police resources. The developed model will reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. We add the woman safety module for security. When women press the power button of android mobile 3 to 4 times then help message send to relatives or police. Due to this we reduce crime in the society and in country. Here we use module of crime capture means user can capture the photo of crime send topolice. There is user or actors which are as follows, 1. User has theaccountandforaccessingthathe/shemust be provide the correct username and password.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 35 2.Alluse-casesforthesoftwarearepresented. Description of all main Use cases use case template is to be provided. 3. A use case diagram in the Unified Modeling Language (UML) is a type of behavioraldiagram definedbyandcreated from a Use-case analysis. Itspurpose is to presentagraphical overview of thefunctionalityprovidedbyasystemintermsof actors, their goals (represented as use cases), and any dependenciesbetweenthoseusecases. Themainpurposeofa use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted. [A]AES Encryption Process AES is an iterative rather than Feistel cipher. It is based on substitution permutation network. Itcomprises ofa series of linked operations, some of which involvereplacing inputs by specific outputs (substitutions) and others involve shuffling bitsaround(permutations). Interestingly,AESperformsallits computations on bytes rather than bits. These 16 bytes are arranged in four columns and four rows for processing as a matrix. Unlike DES, the number of rounds in AES is variable and depends on the length of the key. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. In present day cryptography, AES is widely adopted and supported in both hardware and software. Till date, no practical cryptanalytic attacks against AES have been discovered. Additionally, AES has built-in flexibility of key length, which allows a degree of future- proofingagainstprogressintheability to perform exhaustive key searches. However, just as for DES, the AES security is assured only if it is correctly implemented and good key management is employed. The encryption process uses a set ofspeciallyderivedkeyscalledroundkeys. Theseareapplied, along with other operations, on an array of data that holds exactlyoneblockofdata? thedatatobeencrypted.Thisarray we call the state array. You take the following AES stepsofencryptionfor128-bit block: • Derive the set of round keys from the cipher key. • Initialize the state array with the block data (plaintext). • Add the initial round key to the starting state array. • Perform nine rounds of state manipulation. Fig-1: AES Algorithm The reason that the rounds have been listed as “nine followed by a final tenth round” is because the tenthround involves a slightly different manipulation from the others. Theblocktobeencryptedisjusta sequence of 128bits.AES works with byte quantities so we first convert the 128 bits into 16 bytes. We say “convert,” but, in reality, it is almost certainly stored this way already. Operations in RSN/AES are performed on a two-dimensional byte array of four rows and four columns. At the start of the encryption, the 16 bytes of data, numbered D0 ? D15, are loaded into the array as shown in following Table A. Each round of the encryption process requires a series of steps to alter the statearray. These stepsinvolve four types of operations called: 1. SubBytes 2. ShiftRows 3. MixColumns [B]Data Mining Data mining is a new technology, which helps organizations to process data through algorithms to uncover meaningful patterns and correlations from large databases that otherwise may not be possible with standard analysis and reporting. Data mining tools can helps to understand the business better and also improve future performance through predictive analysis and make them proactive and allow knowledge driven decisions. Issues related to information extraction fro large databases, data miningfield brings together methods from several domainslikeMachine Learning, Statistics, Pattern Recognition, Databases and Visualizations. Data Mining fields find its application in
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 36 market analysis and, managementlikefor examplecustomer relationship, management, cross selling, market segmentation. It can also be used in risk analysis and management for forecasting, customer retention, improved underwriting, quality control, competitive analysis and credit scoring. [C]System Architecture Fig:2 System Architecture [D]Feasibility Analysis Np-hard Np-Complete: • What is P? P is set of all decision problems which can be solved in polynomial time by a deterministic. Since it can be solved in polynomial time, it can be verified in polynomial time. Therefore P is a subset of NP. P: Crime is a matter of major concern to society, it must be checked. Although crime, being an integral part of civilization, it can definitely be kept within limits. The task of maintaining peace and order is delegated internally to the police. What is NP? “NP” means “we can solve it in polynomial time if we can break the normal rules of step-by-step computing”. What is NP Hard? A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-problem (nondeterministic polynomial time) problem. NP-hard therefore means” at least as hard as any NP-problem,” although it might, in fact, be harder. NP-Hard: It would be very difficult to only go through the manual process of crime reporting to police portal. So here in this case the P problem is NP hard. i.e. P=NP-Hard What is NP-Complete?  Since this amazing ”N” computer can also do anythinga normal computer can, we know that ”P” problems are also in ”NP”.  So, the easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in ”NP”, and they are called ”NP-complete”.  It is like saying there are things that People can do (”P”), there are things that Super People
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 37 can do (”SP”), and there are things *only* Super People can do (”SP-complete”). NP-Complete: Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at most likely places of crime for anygiven window of time, to allow most effective utilization of police resources. [E]K – Nearest Neighbor NP Analysis K–Nearest Neighbor algorithm is a Machine Learning Classification Technique. Itis usedtoclassifya givenelement into one of the classes which is closest to the element. Consider a data set of ‘n’ samples and ‘d’ dimensions. There is a point of interest whose class we want to determine on a two-dimensional plot. We calculatethedistance betweenthe point of interest to all other points in the data set.. If the data set is small with less number of dimensions, this algorithm runs in a reasonable amount of time. Since the time complexity of K–Nearest Neighbor algorithm using Brute Force Approach is the algorithm runs in polynomial time and hence fall under P class of Problems. 3. CONCLUSION The developed model will help reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. The project is helpful forgeneral public in getting information about the crime status of the area and get a safe path to a desired destination. REFERENCES [1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis using k-means clustering, International Journal ofComputer Applications, Vol. 83 – No4, December 2013. [2] J. Han, and M. Kamber, ―Data mining: concepts and techniques, Jim Gray, Series Editor Morgan Kaufmann Publishers, August 2000. [3] P. Berkhin, ―Survey ofclusteringdata miningtechniques, In: Accrue Software, 2003. [4] W. Li, ―Modified k-means clustering algorithm, IEEE Congress on Image and Signal Processing, pp. 616- 621, 2006. [5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al- Jabbouli, Data clustering using the Bees algorithm, proceedings of 40th CRIP International Manufacturing Systems Seminar, 2006. [6] J. Han, and M. Kamber, ―Data mining: concepts and techniques, 2nd Edition, Morgan Kaufmann Publisher,2001.