SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET| Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4119
Detection and Analysis of Crime Patterns Using Apriori Algorithm
Arvind Venkatesh1, Hemanth S2, Juyin Shafaq Imtiaz Inamdar3, Lokesh S4
1,2,3Department of Computer Science and Engineering, The National Institute Of Engineering, Mysore
4Associate Professor, Department of Computer Science and Engineering, The National Institute Of Engineering,
Mysore
------------------------------------------------------------***-----------------------------------------------------------------
Abstract - Data mining is a very powerful tool that is
widely used in many industries. In this paper we use data
mining technique to analyze and predict the crime patterns
using apriori algorithm. This paper also reviews the
literatures on various data mining applications, especially
applications that can solve crime using data mining
techniques.
Key words: Crime patterns detection, Data Mining,
Apriori Algorithm, Association Rule Mining
1. INTRODUCTION
Statistics on Crime Records Bureau shows that the crime
rate has significantly increased in the last few years. Due
the increase in the crimes it is more necessary to have a
automated crime detection and prevention system. Several
studies have been conducted in the past to design an
efficient system that can speed up the crime investigations.
However due the changing crime pattern and growing
crime data it has become more important to upgrade the
crime pattern detection and prevention system using latest
data mining technologies. Data mining algorithms can be
used to extract hidden knowledge from huge volume of
data.
Even though we cannot predict who all may be the victims
of crime but can predict the place that has probability for its
occurrence.The predicted results cannot be assured of
100% accuracy but the results shows that our application
helps in reducing crime rate to a certain extent by
providing security in crime sensitive areas. So for building
such a powerful crime analytics tool we have to collect
crime records and evaluate it. Unfortunately due the
classification of crime files by the law enforcement officials
we can access the data that is publically available on blogs,
social media, RSS feeds etc.
The main challenges we are facing are:
 Since the data we collect is huge it needs to be
stored and analyzed.
 The data may be incomplete and inconsistent so
analysis could be very difficult.
 Limitation of getting more crime data due to
classification of crime files by law enforcement
authorities.
The Knowledge Discovery is a very tedious process and
consists of the following steps, to convert from raw data to
some form on new knowledge:
1. Data cleaning: In this step we remove noise and
unnecessary data from the dataset. This step is also
referred to as data cleansing.
2. Data integration: In this step we combine various
data sources to form one single dataset.
3. Data selection: In this step we analyze and carefully
select the relevant data from the dataset.
4. Data transformation: In this step we transform the
selected data into appropriate forms for the mining
procedure. This step is also referred to as data
consolidation
5. Data mining: It is the most important step in which
we use advanced algorithms to extract patterns
that are useful for our application.
6. Pattern evaluation:In this step we identify
important patterns representing knowledges.
7. Knowledge representation: In this step we,
visualize the knowledge data for the user.
2. RELATED WORK
There are number of papers which we have analyzed in
order to determine the technology used and data mining
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4120
techniques. The review of literature will involve efficient
and usable techniques such as fuzzy system and weka tool.
Some of the research paper that were reviewed during
survey were: “Z-crime: A data mining tool for the detection
of suspicious criminal activities based on decision tree” [1],
“Association bundle- a new pattern for association analysis
[2]”, ”Enhancing k-means algorithm for solving
classification problems“ [10], ”Mining crime data by using
new similarity measure.” [4], “Crime Analysis and
Prediction Using Data Mining” [6], “Improved Apriori
algorithm based on Selection Criterion” [11] , “An
Improvement Apriori Arithmetic based on Rough set
Theory“ [12].
Some of the limitations of other systems that were explored
during the survey were:
1. Stores crime data and retrieves the same
2. No extraction of useful information
3. No extraction of crime patterns
4. Lack of user satisfaction
5. Less Efficient
3. PROPOSED SYSTEM
Proposed system includes modeling of crimes for finding
suitable algorithms to detect the crime, precise detection,
data preparation and transformation, and processing time.
Proposed system identifies crime behavior, crime
predicting, precise detection, and managing large volumes
of data obtained from various sources. Proposed system is
an automation for complaints registration, crime pattern
prediction based on the previous crime details collected
from various sources.
3.1 Scope and Objectives
Proposed system is a web enabled application.
1. Proposed system is an innovative crime detection
system.
2. Proposed system major objective is to predict the
crimes and their patterns.
3. Proposed system makes use of data mining
technique called as “Association Rules” for crime
pattern discovery.
4. Proposed system is an automation for early crimes
pattern prediction which avoids crimes.
5. Proposed system makes use of previous crime
details , date and location for the prediction of
crime patterns.
6. Proposed system is an real time application where
complaints are registers and crime details.
The main module is Crime Trendz Prediction Module. In
this module, system predicts crime patterns based on the
past crime details collected from various sources. Here
system uses “Association Rule Mining” to analyze previous
crime data and to extract the crime trends.
3.2 Apriori Algorithm
STEP 1: Scan the opinion data set and determine the
support(s) of each item.
STEP 2: Generate L1 (Frequent one item set).
STEP 3: Use Lk-1, join Lk-1 to generate the set of candidate
k - item set.
STEP 4: Scan the candidate k item set and generate the
support of each candidate k – item set.
STEP 5: Add to frequent item set, until C=Null Set.
STEP 6: For each item in the frequent item set generate all
non empty subsets.
STEP 7: For each non empty subset determine the
confidence. If confidence is greater than or equal to this
specified confidence .Then add to Strong Association Rule.
For example let’s consider crime types A, B, C, D and E. We
represent the crime in the table 1.
Table – 1: Crime Data
ID Crimes
1 A,C,D
2 A,C,E
3 A,B,C,E
4 B,E
The sets C1, C2, C3, L1, L2, and L3 are calculated as
following using the rule Minimum confidence is 80% and
Minimum Support is 50%. Finally the frequent item set (L)
and Gained confidence set (G) is also obtained. Using all the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4121
above tables the association rule is calculated.
Table -2: Set C1
Items Support
Table -3: Set L1
Items Support
A 75%
B 50%
C 75%
E 75%
Table -4: Set C2
Items Support
AB 25%
AC 75%
AE 50%
BC 25%
BE 50%
CE 50%
Table -5: Set L2
Items Support
AC 75%
AE 50%
BE 50%
CE 50%
Table -6: Set C3
Items Support
ACE 50%
ABC 25%
ABE 25%
BCE 25%
Table -7: Set L3
Items Support
ACE 50%
Table -8: Frequent Item Set (L)
Items Support
A 75%
B 50%
C 75%
E 75%
AC 75%
AE 50%
BE 50%
CE 50%
ACE 50%
Table -9: Generate Confidence
RULE X RULE Y CONFIDENCE
{A} ⇨ {C} 100%
{C} ⇨ {A} 100%
{A} ⇨ {E} 66%
{E} ⇨ {A} 66%
{B} ⇨ {E} 100%
{E} ⇨ {B} 66%
{C} ⇨ {E} 66%
{E} ⇨ {C} 66%
{A} ⇨ {CE} 66%
{C} ⇨ {AE} 66%
{E} ⇨ {AC} 66%
{CE} ⇨ {A} 100%
{AE} ⇨ {C} 100%
{AC} ⇨ {E} 66%
STRONG ASSOCIATION RULE
{B} ⇨ {E}
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4122
{CE} ⇨ {A}
{AE} ⇨ {C}
{A} ⇨ {C}
{C} ⇨ {A}
4. IMPLEMENTATION AND RESULT
The entire project was implemented using the following
configuration:
1. Frame work: DOTNET (suitable technology as it requires
less time for implementation of this project)
2. IDE: Visual Studio 2010 (tool used for the development of
.NET applications)
3. Front end: ASP.NET 4.0 (technology which is used for the
development of internet-working applications)
4. Programming Language :
C#.NET (programming language which is used for
processing purpose)
5. Back End – MS SQL Server (used to store the crime data)
Several data sources were used to gather the required data
and uploaded into the database. After testing each module
of the software the results were noted down. The sample
data and results are shown below in the figure 1.1
Figure 1: Result of sample dataset
5. CONCLUSION
Crime are characterized which change over time and
increase continuously. The changing and increasing of
crime lead to the issues of understanding the crime
behaviour, crime predicting, precise detection, and
managing large volumes of data obtained from
various sources. Research interests have tried to solve
these issues. However, these researches are still gaps
in the crime detection accuracy. This leads to the
challenges in the field of crime detection. The
challenges include modeling of crimes for finding
suitable algorithms to detect the crime, precise
detection, data preparation and transformation, and
processing time.
6. FUTURE ENHANCEMENT
For future enhancements we can add:
 Online Complaint Registration (Public) portal
to collect the data.
 Query Module (public can post queries to
administrator)
7. REFERENCES
[1] Mugdha Sharma . “ Z - CRIME: A data mining tool
for the detection of suspicious criminal activities
based on decision tree”. IEEE 2014
[2] Wenxue Huang; Milorad Krneta; Limin Lin;
Jianhong Wu . Association Bundle - “A New Pattern for
Association Analysis”. IEEE 2007
[3] Arit Thammano; Pannee Kesisung. “Enhancing K-
means algorithm for solving classification problems”.
IEEE 2013
[4] Guangzhu Yu; Shihuang Shao; Bing Luo . “Mining
Crime Data by Using New Similarity Measure”. IEEE
2008
[5] Isuru Jayaweera; Chamath Sajeewa; Sampath
Liyanage; Tharindu Wijewardane; Indika Perera;
Adeesha Wijayasiri “Crime analytics: Analysis of
crimes through newspaper articles”. IEEE 2015
[6] Shiju Sathyadevan; Devan M. S.; Surya S
Gangadharan. “Crime Analysis and Prediction Using
Data Mining”. First International Conference on
Networks & Soft Computing (ICNSC), 2014
[7] Ubon Thongsatapornwatana, “A Survey Of Data
Mining Techniques For Analyzing Crime Patterns”,
2016 Second Asian Conference on Defence
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4123
Technology (ACDT)
[8] P.Dhakshinamoorthy, T.Kalaiselvan, “Crime
Pattern Detection Using Data Mining”, International
Journal of Advanced Research in Computer Science
and Applications Vol.1, Issue 1, July 2013
[9] Nidhi Tomar, Amit Kumar Manjhvar, “An Improved
Optimized Clustering Technique For Crime Detection”,
2016 Symposium on Colossal Data Analysis and
Networking (CDAN)
[10] Arit Thammano; Pannee Kesisung; “Enhancing K-
means algorithm for solving classification problems”,
Mechatronics and Automation (ICMA), 2013 IEEE
International Conference
[11] V. Vaithiyanathan; Rajeswari Kannan; Rashmi
Phalnikar; Swati Tonge; “Improved apriori algorithm
based on selection criterion”, Computational
Intelligence & Computing Research (ICCIC), 2012 IEEE
International Conference
[12] Chen, Chu-xiang & Shen, Jian-jing & Chen, Bing &
Shang, Chang-xing & Wang, Yun-cheng. (2011). “An
Improvement Apriori Arithmetic Based on Rough Set
Theory”. Proceedings - PACCS 2011: 2011 3rd Pacific-
Asia Conference on Circuits, Communications and
System. 10.1109/PACCS.2011.5990261.

Mais conteúdo relacionado

Mais procurados

IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and SecurityIRJET Journal
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint ScannerIRJET Journal
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedIRJET Journal
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
 
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
IRJET -  	  Eloquent Salvation and Productive Outsourcing of Big DataIRJET -  	  Eloquent Salvation and Productive Outsourcing of Big Data
IRJET - Eloquent Salvation and Productive Outsourcing of Big DataIRJET Journal
 

Mais procurados (9)

IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
IRJET -  	  Eloquent Salvation and Productive Outsourcing of Big DataIRJET -  	  Eloquent Salvation and Productive Outsourcing of Big Data
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
 

Semelhante a IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm

Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGIRJET Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction SystemIRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET Journal
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET Journal
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET Journal
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...IRJET Journal
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET Journal
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation PortalIRJET Journal
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET Journal
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
IRJET- Secure Distributed Data Mining
IRJET- Secure Distributed Data MiningIRJET- Secure Distributed Data Mining
IRJET- Secure Distributed Data MiningIRJET Journal
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET Journal
 

Semelhante a IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm (20)

Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning Algorithm
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
IRJET- Secure Distributed Data Mining
IRJET- Secure Distributed Data MiningIRJET- Secure Distributed Data Mining
IRJET- Secure Distributed Data Mining
 
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack PredictionIRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 

Último (20)

High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 

IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET| Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4119 Detection and Analysis of Crime Patterns Using Apriori Algorithm Arvind Venkatesh1, Hemanth S2, Juyin Shafaq Imtiaz Inamdar3, Lokesh S4 1,2,3Department of Computer Science and Engineering, The National Institute Of Engineering, Mysore 4Associate Professor, Department of Computer Science and Engineering, The National Institute Of Engineering, Mysore ------------------------------------------------------------***----------------------------------------------------------------- Abstract - Data mining is a very powerful tool that is widely used in many industries. In this paper we use data mining technique to analyze and predict the crime patterns using apriori algorithm. This paper also reviews the literatures on various data mining applications, especially applications that can solve crime using data mining techniques. Key words: Crime patterns detection, Data Mining, Apriori Algorithm, Association Rule Mining 1. INTRODUCTION Statistics on Crime Records Bureau shows that the crime rate has significantly increased in the last few years. Due the increase in the crimes it is more necessary to have a automated crime detection and prevention system. Several studies have been conducted in the past to design an efficient system that can speed up the crime investigations. However due the changing crime pattern and growing crime data it has become more important to upgrade the crime pattern detection and prevention system using latest data mining technologies. Data mining algorithms can be used to extract hidden knowledge from huge volume of data. Even though we cannot predict who all may be the victims of crime but can predict the place that has probability for its occurrence.The predicted results cannot be assured of 100% accuracy but the results shows that our application helps in reducing crime rate to a certain extent by providing security in crime sensitive areas. So for building such a powerful crime analytics tool we have to collect crime records and evaluate it. Unfortunately due the classification of crime files by the law enforcement officials we can access the data that is publically available on blogs, social media, RSS feeds etc. The main challenges we are facing are:  Since the data we collect is huge it needs to be stored and analyzed.  The data may be incomplete and inconsistent so analysis could be very difficult.  Limitation of getting more crime data due to classification of crime files by law enforcement authorities. The Knowledge Discovery is a very tedious process and consists of the following steps, to convert from raw data to some form on new knowledge: 1. Data cleaning: In this step we remove noise and unnecessary data from the dataset. This step is also referred to as data cleansing. 2. Data integration: In this step we combine various data sources to form one single dataset. 3. Data selection: In this step we analyze and carefully select the relevant data from the dataset. 4. Data transformation: In this step we transform the selected data into appropriate forms for the mining procedure. This step is also referred to as data consolidation 5. Data mining: It is the most important step in which we use advanced algorithms to extract patterns that are useful for our application. 6. Pattern evaluation:In this step we identify important patterns representing knowledges. 7. Knowledge representation: In this step we, visualize the knowledge data for the user. 2. RELATED WORK There are number of papers which we have analyzed in order to determine the technology used and data mining
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4120 techniques. The review of literature will involve efficient and usable techniques such as fuzzy system and weka tool. Some of the research paper that were reviewed during survey were: “Z-crime: A data mining tool for the detection of suspicious criminal activities based on decision tree” [1], “Association bundle- a new pattern for association analysis [2]”, ”Enhancing k-means algorithm for solving classification problems“ [10], ”Mining crime data by using new similarity measure.” [4], “Crime Analysis and Prediction Using Data Mining” [6], “Improved Apriori algorithm based on Selection Criterion” [11] , “An Improvement Apriori Arithmetic based on Rough set Theory“ [12]. Some of the limitations of other systems that were explored during the survey were: 1. Stores crime data and retrieves the same 2. No extraction of useful information 3. No extraction of crime patterns 4. Lack of user satisfaction 5. Less Efficient 3. PROPOSED SYSTEM Proposed system includes modeling of crimes for finding suitable algorithms to detect the crime, precise detection, data preparation and transformation, and processing time. Proposed system identifies crime behavior, crime predicting, precise detection, and managing large volumes of data obtained from various sources. Proposed system is an automation for complaints registration, crime pattern prediction based on the previous crime details collected from various sources. 3.1 Scope and Objectives Proposed system is a web enabled application. 1. Proposed system is an innovative crime detection system. 2. Proposed system major objective is to predict the crimes and their patterns. 3. Proposed system makes use of data mining technique called as “Association Rules” for crime pattern discovery. 4. Proposed system is an automation for early crimes pattern prediction which avoids crimes. 5. Proposed system makes use of previous crime details , date and location for the prediction of crime patterns. 6. Proposed system is an real time application where complaints are registers and crime details. The main module is Crime Trendz Prediction Module. In this module, system predicts crime patterns based on the past crime details collected from various sources. Here system uses “Association Rule Mining” to analyze previous crime data and to extract the crime trends. 3.2 Apriori Algorithm STEP 1: Scan the opinion data set and determine the support(s) of each item. STEP 2: Generate L1 (Frequent one item set). STEP 3: Use Lk-1, join Lk-1 to generate the set of candidate k - item set. STEP 4: Scan the candidate k item set and generate the support of each candidate k – item set. STEP 5: Add to frequent item set, until C=Null Set. STEP 6: For each item in the frequent item set generate all non empty subsets. STEP 7: For each non empty subset determine the confidence. If confidence is greater than or equal to this specified confidence .Then add to Strong Association Rule. For example let’s consider crime types A, B, C, D and E. We represent the crime in the table 1. Table – 1: Crime Data ID Crimes 1 A,C,D 2 A,C,E 3 A,B,C,E 4 B,E The sets C1, C2, C3, L1, L2, and L3 are calculated as following using the rule Minimum confidence is 80% and Minimum Support is 50%. Finally the frequent item set (L) and Gained confidence set (G) is also obtained. Using all the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4121 above tables the association rule is calculated. Table -2: Set C1 Items Support Table -3: Set L1 Items Support A 75% B 50% C 75% E 75% Table -4: Set C2 Items Support AB 25% AC 75% AE 50% BC 25% BE 50% CE 50% Table -5: Set L2 Items Support AC 75% AE 50% BE 50% CE 50% Table -6: Set C3 Items Support ACE 50% ABC 25% ABE 25% BCE 25% Table -7: Set L3 Items Support ACE 50% Table -8: Frequent Item Set (L) Items Support A 75% B 50% C 75% E 75% AC 75% AE 50% BE 50% CE 50% ACE 50% Table -9: Generate Confidence RULE X RULE Y CONFIDENCE {A} ⇨ {C} 100% {C} ⇨ {A} 100% {A} ⇨ {E} 66% {E} ⇨ {A} 66% {B} ⇨ {E} 100% {E} ⇨ {B} 66% {C} ⇨ {E} 66% {E} ⇨ {C} 66% {A} ⇨ {CE} 66% {C} ⇨ {AE} 66% {E} ⇨ {AC} 66% {CE} ⇨ {A} 100% {AE} ⇨ {C} 100% {AC} ⇨ {E} 66% STRONG ASSOCIATION RULE {B} ⇨ {E}
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4122 {CE} ⇨ {A} {AE} ⇨ {C} {A} ⇨ {C} {C} ⇨ {A} 4. IMPLEMENTATION AND RESULT The entire project was implemented using the following configuration: 1. Frame work: DOTNET (suitable technology as it requires less time for implementation of this project) 2. IDE: Visual Studio 2010 (tool used for the development of .NET applications) 3. Front end: ASP.NET 4.0 (technology which is used for the development of internet-working applications) 4. Programming Language : C#.NET (programming language which is used for processing purpose) 5. Back End – MS SQL Server (used to store the crime data) Several data sources were used to gather the required data and uploaded into the database. After testing each module of the software the results were noted down. The sample data and results are shown below in the figure 1.1 Figure 1: Result of sample dataset 5. CONCLUSION Crime are characterized which change over time and increase continuously. The changing and increasing of crime lead to the issues of understanding the crime behaviour, crime predicting, precise detection, and managing large volumes of data obtained from various sources. Research interests have tried to solve these issues. However, these researches are still gaps in the crime detection accuracy. This leads to the challenges in the field of crime detection. The challenges include modeling of crimes for finding suitable algorithms to detect the crime, precise detection, data preparation and transformation, and processing time. 6. FUTURE ENHANCEMENT For future enhancements we can add:  Online Complaint Registration (Public) portal to collect the data.  Query Module (public can post queries to administrator) 7. REFERENCES [1] Mugdha Sharma . “ Z - CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree”. IEEE 2014 [2] Wenxue Huang; Milorad Krneta; Limin Lin; Jianhong Wu . Association Bundle - “A New Pattern for Association Analysis”. IEEE 2007 [3] Arit Thammano; Pannee Kesisung. “Enhancing K- means algorithm for solving classification problems”. IEEE 2013 [4] Guangzhu Yu; Shihuang Shao; Bing Luo . “Mining Crime Data by Using New Similarity Measure”. IEEE 2008 [5] Isuru Jayaweera; Chamath Sajeewa; Sampath Liyanage; Tharindu Wijewardane; Indika Perera; Adeesha Wijayasiri “Crime analytics: Analysis of crimes through newspaper articles”. IEEE 2015 [6] Shiju Sathyadevan; Devan M. S.; Surya S Gangadharan. “Crime Analysis and Prediction Using Data Mining”. First International Conference on Networks & Soft Computing (ICNSC), 2014 [7] Ubon Thongsatapornwatana, “A Survey Of Data Mining Techniques For Analyzing Crime Patterns”, 2016 Second Asian Conference on Defence
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4123 Technology (ACDT) [8] P.Dhakshinamoorthy, T.Kalaiselvan, “Crime Pattern Detection Using Data Mining”, International Journal of Advanced Research in Computer Science and Applications Vol.1, Issue 1, July 2013 [9] Nidhi Tomar, Amit Kumar Manjhvar, “An Improved Optimized Clustering Technique For Crime Detection”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN) [10] Arit Thammano; Pannee Kesisung; “Enhancing K- means algorithm for solving classification problems”, Mechatronics and Automation (ICMA), 2013 IEEE International Conference [11] V. Vaithiyanathan; Rajeswari Kannan; Rashmi Phalnikar; Swati Tonge; “Improved apriori algorithm based on selection criterion”, Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference [12] Chen, Chu-xiang & Shen, Jian-jing & Chen, Bing & Shang, Chang-xing & Wang, Yun-cheng. (2011). “An Improvement Apriori Arithmetic Based on Rough Set Theory”. Proceedings - PACCS 2011: 2011 3rd Pacific- Asia Conference on Circuits, Communications and System. 10.1109/PACCS.2011.5990261.