Using Mapreduce Techniques to Predict and Examine Crime Pattern
Keywords:Crime, data mining, crime patterns, Hadoop.
The evolution of computer structures and networks has created an alternative set for crook acts, extensively known as the crime. Crime incidents occurrences of specific criminal offenses lead to a heavy risk to the world economy, protection, and well-being of society. This paper provides complete information of crime incidents and their corresponding offenses combining a sequence of strategies in line with the appropriate literature. Initially, this paper evaluates and identifies the alternatives to crime incidents, their individual components and proposes a combinatorial incident-description schema. The schema offers the chance to systematically blend various elements or crime traits. Moreover, a complete listing of crime-associated offenses is provided in this paper. So, to increase the performance of crime detection, it is essential to choose the data mining strategies appropriately. Hadoop enables to solve the crime as a radical expertise of the repetition and underlying criminal activities. Using Hadoop, we can locate the specific city and analyze the crime patterns, based on that give preventive measures to people.
 H. Chen, W. Chung, Y. Qin, M. Chau, J. J. Xu, G. Wang, R. Zheng, and H.Atabakhsh, â€œCrime data mining: An overview and case studies,â€ in Proceedings of the 2003 Annual National Conference on Digital Government Research, ser. dg.o â€™03. Digital Government Society of North America, 2003, pp. 1â€“5. [Online]. Available: http://dl.acm.org/citation.cfm?id=1123196.1123231
 Chu-xiang, S. Jian-jing, C. Bing, S. Chang-xing, and W. Yun-cheng, â€œAn improvement apriori arithmetic based on rough set theory,â€in Circuits, Communications and System (PACCS), 2011 Third Pacific-Asia Conference on, July 2011, pp. 1â€“3.
 A. Ben Aye, M. Ben Halima, and A. Alimi, â€œSurvey on clustering methods: Towards fuzzy clustering for big data,â€ in Soft Computing and Pattern Recognition (SoCPaR), 2014 6th International Conference of, Aug 2014, pp. 331â€“336.
 S. Sathyadevan, M. Devan, and S. Surya Gangadharan, â€œCrime analysis and prediction using data mining,â€ in Networks Soft Computing(ICNSC), 2014 First International Conference on, Aug 2014, pp. 406â€“412.
 C.-H. Yu, M. Ward, M. Morabito, and W. Ding, â€œCrime forecasting using data mining techniques,â€ in Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, Dec 2011, pp. 779â€“786.
 G. Yu, S. Shao, and B. Luo, â€œMining crime data by using new similarity measure,â€ in Genetic and Evolutionary Computing, 2008. WGEC â€™08. Second International Conference on, Sept 2008, pp. 389â€“392.
 S. Kaza, D. Hu, H. Atabakhsh, and H. Chen, â€œPredicting criminal relationships using multivariate survival analysis,â€ in Proceedings of the 8th Annual International Conference on Digital Government Research: Bridging Disciplines & Domains, ser. dg.o â€™07. Digital Government Society of North America, 2007, pp. 290â€“291. [Online]. Available: http://dl.acm.org/citation.cfm?id=1248460.1248524
 G. Fogel and M. Cheung, â€œDerivation of quantitative structure-toxicity relationships for Eco toxicological effects of organic chemicals: evolving neural networks and evolving rules,â€ in Evolutionary Computation, 2005. The 2005 IEEE Congress on, vol. 1, Sept 2005, pp. 274â€“281 Vol.1.
 McGregor, C. Cutely, and A. James, â€œVariability analysis with analytics applied to physiological data streams from the neonatal intensive care unit,â€ in Computer-Based Medical Systems (CBMS), 2012 25th International Symposium , June 2012, pp. 1â€“5.
 M. Chau, J. J. Xu, and H. Chen, â€œExtracting meaningful entities from police narrative reports,â€ in Proceedings of the 2002 Annual National Conference on Digital Government Research, ser. dg.o â€™02. Digital Government Society of North America, 2002, pp. 1â€“5. [Online].Available:http://dl.acm.org/citation.cfm?id=1123098.1123138
 L. Cunhua, H. Yun, and Z. Zhao man, â€œAn event ontology construction approach to web crime mining,â€ in Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on, vol. 5, Aug 2010, pp. 2441â€“2445.
 I. Jayaweera, C. Sajeewa, S. Liyanage, T. Wijewardane, I. Perera, and A. Wijayasiri, â€œCrime analytics: Analysis of crimes through newspaper articles,â€ in Moratuwa Engineering Research Conference (MERCon), 2015, April 2015, pp. 277â€“282.
 M. Sharma, â€œZ - crime: A data mining tool for the detection of suspicious criminal activities based on decision tree,â€ in Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on, Sept 2014, pp. 1â€“6.
 A. Kawbunjun, U. Thongsatapornwatana, and W. Lilakiatsakun, â€œFramework of marketing or newsletter sender reputation system (fmnsrs),â€ in Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on, March 2015, pp. 420â€“ 427.
 L. Alfantoukh and A. Durresi, â€œTechniques for collecting data in social networks,â€ in Network-Based Information Systems (Nibâ€™s), 2014 17th International Conference on, Sept 2014, pp. 336â€“341.
 H. Jin and H. Liu, â€œResearch on visualization techniques in data mining,â€ in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, Dec 2009, pp. 1â€“3.
 KVM Hypervisor, accessed on: March 25, 2013. [Online]. Available: www.linux-kvm.org/.HadoopMap Reduce. [Online]. Available: http://hadoop.apache.org
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).