An enhanced rule mining algorithm to detect suspects of crime against women in the state of Tamil Nadu

  • Authors

    • D. Usha
    • D. Chitradevi
    2018-09-22
    https://doi.org/10.14419/ijet.v7i4.5.25065
  • Crime Pattern, Data mining, Rule Mining Algorithm, Modus Operandi.
  • Crime against women in India has become a prominent topic of argument in the recent years and the issue has been brought to the foreground for concern due to the increasing trend in crimes performed against women. It is the major challenge to the investigators to detect and prevent crimes, particularly crime against women. Most of the crimes get reported and a massive dataset is being generated every year. Analyzing the crime reports can help the law enforcement officers to take preventive measures for reducing the crime, but processing this voluminous data is backbreaking and error prone. So, the application of various data mining techniques can help in visualizing the crime trend. Crime is one of the interesting applications where data mining plays an important role in terms of prediction and analysis in the interest of society. This paper covers in detail analysis of modus operandi of committing crimes and effective use of data mining techniques and algorithms in narrow down to identify the criminals at a short span of time.

     

     

  • References

    1. [1] Phua, Clifton. 2012. “Resilient identity crime detectionâ€, Knowledge and Data Engineering, IEEE Transactions, Vol.24, Is- sue.3, pp.533-546.

      [2] O. Jamsheela; Raju G. 2015. “Frequent itemset mining algorithms: A literature surveyâ€, IEEE International Advance Computing Con- ference (IACC) pp. 1099 – 1104.

      [3] Raymond B. Fosdick. 1916. “Modus operandi system in the detec- tion of criminalsâ€, Journal of Criminal Law and Criminology, Vol.6, Issue.4, pp.560-570.

      [4] Wortley, R., & Mazerolle, L. 2008. "Environmental criminology and crime analysis", Willam Publishing.

      [5] Krishnamurthi’s a handbook of criminal lawâ€, Revised by Justice G.Ramanujam (Retd.) Madras High Court, 2009.

      [6] National review of status, source from: affidavit submitted by Del- hi Police in Court.

      [7] Revathy Krishnamurthy, J.Satheesh Kumar. 2012 Survey of data mining techniques on crime data analysisâ€, International Journal of Data Mining Techniques and Applications, Vol.1, Issue.2, pp.117- 120.

      [8] Aniruddha, Lalit Dole. 2014. “A review on data mining methods for identity crime detectionâ€, International Journal of Electrical, Electronics and Computer Systems, Vol.2, Issue.1, pp. 51-55.

      [9] P.Dhakshinamoorthy, T.Kalaiselvan. 2013. “Crime pattern detec- tion using data mining†International journal of advanced research in computer science and applications, Vol.1, Issue 1. Pp.46-50.

      [10] Tushar Sonawanev. 2015. “Crime pattern analysis, Visualization and prediction using Data miningâ€, IJARIIE, Vol.1, Issue.4.

      [11] Aarti Bansal, 2015. “Performance comparison of data mining tech- niques to analyse crime against womenâ€, International Journal of Scientific Research and Education, Vol.3, Issue.9, pp.4494-4512.

      [12] Rachel Boba Santos, “Crime analysis with crime mappingâ€, 3rdedition.

      [13] Gupta. 2008. “Crime data mining for Indian Police Information Systemâ€, Proceeding of the 2008 Computer Society of India.

      [14] Stages of Crime, [online] Available at http://www.lawnotes.in/Criminology.

      [15] Crime victims [online] available at www.countercurrents.org.

  • Downloads

  • How to Cite

    Usha, D., & Chitradevi, D. (2018). An enhanced rule mining algorithm to detect suspects of crime against women in the state of Tamil Nadu. International Journal of Engineering & Technology, 7(4.5), 713-715. https://doi.org/10.14419/ijet.v7i4.5.25065