Analysis of Crime Pattern using Data Mining Techniques

被引:0
|
作者
Ugwuishiwu, Chikodili Helen [1 ]
Ogbobe, Peter O. [2 ]
Okoronkwo, Matthew Chukwuemeka [1 ]
机构
[1] Univ Nigeria, Comp Sci Dept, Nsukka, Enugu State, Nigeria
[2] Natl Board Technol Incubat, Abuja, Nigeria
关键词
Information technology; law enforcement agency; data mining; crime; classification and rule induction;
D O I
10.14569/IJACSA.2021.0121259
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advancement in Information Technology permits high volume of data to be generated in databases of institutions, organizations, government, including Law Enforcement Agencies (LEAs). Technologies have also been developed to store and manipulate these data to enhance decision making. Crime remains a severe threat to humanity. Criminals currently, exploit highly sophisticated technologies to perform criminal activities. To effectively combat crime, LEAs must be adequately equipped with technological tools such as data mining technology to enable useful discoveries from databases. To achieve this, a Real-time Integrated Crime Information System (RICIS) was developed and mobile phones were used by informants (general public) to capture information about crimes being committed within Southern-East, Nigeria. Each crime information captured is being sent to the LEA responsible for the crime type and the information is stored in the agency database for data analysis. Thus, this study uses data mining algorithms to analyze crime trends and patterns in Southern-Eastern part of Nigeria between 2012 and 2013. The algorithms adopted were Classification and Rule Induction. The data set of 973 were collected from Eleme Police station, PortHarcourt (2012) and Nsukka Police station (2013). The analysis enables identifications of some trends of crimes and criminal activities from various LEAs databases, enhancing crime control and public safety.
引用
收藏
页码:447 / 455
页数:9
相关论文
共 50 条
  • [31] Identity Crime Detection using Data Mining
    Dutta, Sharmistha
    Gupta, Ankit Kumar
    Narayan, Neetu
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 1 - 5
  • [32] An Analysis of Data Mining Applications in Crime Domain
    Thongtae, P.
    Srisuk, S.
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 122 - 126
  • [33] Association Rule Mining on Crime Pattern Mining
    Roy, Suman
    Bordoloi, Ripunjoy
    Das, Kayboy Jyoti
    Kumar, Santosh
    Muchahari, Monoj Kumar
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 269 - 272
  • [34] Special Issue on Pattern Recognition Techniques in Data Mining
    Armengol, Eva
    Boixader, Dionis
    Grimaldo, Francisco
    [J]. PATTERN RECOGNITION LETTERS, 2017, 93 : 1 - 2
  • [35] USING VISUAL DATA MINING TECHNIQUES IN CLUSTERING ANALYSIS AND AN APPLICATION
    Vatansever, Metin
    Buyuklu, Ali Hakan
    [J]. SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI, 2009, 27 (02): : 83 - 104
  • [36] Analysis of breast cancer using data mining & statistical techniques
    Xiong, XC
    Kim, YO
    Baek, YC
    Rhee, DW
    Kim, SH
    [J]. Sixth International Conference on Software Engineerng, Artificial Intelligence, Networking and Parallel/Distributed Computing and First AICS International Workshop on Self-Assembling Wireless Networks, Proceedings, 2005, : 82 - 87
  • [37] Agriculture Analysis Using Data Mining And Machine Learning Techniques
    Vanitha, C. N.
    Archana, N.
    Sowmiya, R.
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 984 - 990
  • [38] Analysis and Prevention of Dispension Errors by Using Data Mining Techniques
    Tseng, Vincent S.
    Chen, Chun-Hao
    Chen, Hsiao-Ming
    Chang, Hui-Jen
    Yu, Chin-Tai
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, 2007, : 65 - +
  • [39] Analysis of Firewall Policy Rules Using Data Mining Techniques
    Golnabi, Korosh
    Min, Richard K.
    Khan, Latifur
    Al-Shaer, Ehab
    [J]. 2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 305 - +
  • [40] A Survey on Breast Cancer Analysis Using Data Mining Techniques
    Padmapriya, B.
    Velmurugan, T.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1234 - 1237