We accept

Survey Of Data Mining Techniques On Offense Data Criminology Essay

Data mining is a process of extracting knowledge from huge amount of data stored in databases, data warehouse and data repositories. Criminal offenses can be an interesting application where data mining performs an important role in conditions of criminal offense prediction and research. This paper reveals detailed analysis on clustering techniques and its role on offense applications. This also helps regulations enforcers in better research and crime prediction.

Key words: Criminal offense data mining, criminal offenses data examination, clustering.


In recent years, volume of offences lead to serious problems across the world. Now-a- days bad guys have maximum use of modern systems and hi-tech methods which serve up bad guys to commit offences at an enormous measure. Regulations enforcers have to effectively meet out challenges of criminal offense control and maintain public law and order. Hence, creation of a data platform for crimes and criminals is required. Data mining techniques have higher influence in the areas such as law-and-enforcement, narcotics, cyber criminal offenses, human trafficking and high-tech crimes. Criminal offenses data mining has been applied in regulations and enforcement to get the criminal details and useful information automatically, using called entity-extraction method. In this technique, each term is compared with the noun phrases and the binary value either zero or one will be produced which signifies the match or mismatch of the name.

Intelligence businesses and school of Az collaborated COPLINK project and applied crime data mining in two-dimensions as criminal offenses types and security concerns to analyses offense and crooks and face obstacles of law-enforcement problems of significant data bases from authorities narrative details [9]. Suspects give details to authorities investigations in order to mistake and ruin the proceedings of the research. Before investigation, comparison is required to find the distinctions between real entities and deceptive entities. Among the distance measurement methods is Euclidean distance method which is put on calculate the length between pairs of the true and deceptive entity which distance provides deceptions accurately during recognition [10]. Hence, data mining techniques and clustering algorithms have been developed for better criminal offense analysis which causes the prediction of crimes in future.

The business of the paper is really as follows. Section II discusses some researches and applications on crime data examination. Section III defines the role of data preprocessing in criminal offenses data mining. Section IV reveals various clustering methods on criminal offenses domains and Section V talks about the conclusion and future work.

II Related work

Recent advancements in offense control applications aim at adopting data mining ways to aid the process of crime investigation. One of the earlier jobs COPLINK, was teamed with Man-made Intelligence Lab of Arizona University, the police departments of Tuscon, Phonix dealing with crime and legal network examination [8]. Brown et al. suggested a construction for regional crime analysis (ReCAP), which was built to provide crime analysis with both data fusion and data mining techniques[2]. Data mining steps involved in crime investigations are: collection of crime data from multiple data resources such as authorities narrative records, police arrest records information which includes previous investigation documents and police force arrest records are being used to analyze whether a suspect was involved with any earlier instances. If it so, verdict signs from earlier annals presenting the suspect and it avails the researchers to preside in the case.

Using criminal offense data mining techniques, most required information has been extracted from the great crime databases that happen to be looked after by NCRB (National Criminal offenses Record Bureau) for locating criminal offense hot-spots. This can help the law enforcers to predict the crimes and also to prevent in the near-future. Nath et al. has suggested k-means clustering technique with some improvements to aid the process of identification of crime patterns. Semi-supervised learning technique for knowledge discovery has also been further developed which helps to improve the predictive precision [6]. J. S. de Bruin, K. Cocx and Kosters et al. have applied clustering techniques for the examination of offences and criminal providers based on four salient factors such as offense nature, frequency, duration and severity of crime[3]. Binary (BCS) and transformed (TCS) categorical methods are similarity based methods used to get the similarity of corresponding features between real and deceptive entities from the offense files[13]. Ozgul et al. just lately suggested a criminal offense prediction model on criminal offenses details like location, particular date of the event and mode-of-operandi of occasions against terrorists which have not been solved[20]. An improved Ak-mode algorithm called a weighted clustering algorithm which involves two-phases to extract similar circumstance subsets from large numbers of criminal offense datasets[16].

III. Role of data preprocessing in criminal offenses data mining

Data preprocessing techniques are mainly utilized for producing high-quality mining results. Fresh data are being preprocessed before mining because data are in different format, accumulated from various sources and stored in the data bottom and data warehouses. Major steps involved with criminal offenses data mining are data cleaning, data integration, data change and data lowering.

Data Cleaning

Fill in missing criminal offense data value.

Smoothing criminal offenses data

Removing outliers of offense data.

Resolve inconsistent offense data.

Data integration

Merging of criminal offense data from multiple data storages.

Data Transformation

Crime data normalization.

Attribute construction

Data Reduction

Crime Feature subset selection.

Dimensionality reduced amount of crime attributes

Data mining process




Mining results

Fig. Data Preprocessing steps in criminal offenses data mining

Crime data have been collected from different sources such as police force narrative records, criminal profiles, circumstance histories and log documents. In the data cleaning step, absent values are packed, loud data are smoothened, outliers data are removed and inconsistent data are resolved. Data integration step goes through merging of criminal offenses data. Data normalization and attribution development are done in the data transformation for standardizing data. When standardization of criminal offenses data, the data range comes under 0. 0 to 1 1. 0. Attribute subsets are determined from offense dataset and dimensionality has reduced. After preprocessing, finally standard data underwent the process of mining and hence better results are obtained.

IV. Request of clustering methods in Crime

The Clustering methods play an important role on criminal offenses applications. Some of the clustering techniques highlighted are k-means clustering, Ak-mode algorithm and other similarity methods. After preprocessing, the operational offense data are starting the clustering techniques for grouping the type of crimes as different clusters. In this process, lots of unsolved offences are also grouped together. The next phase of clustering is to identify the significant or decisive feature. This might from circumstance to circumstance. ie. one of the situations may need age group of sufferer as decisive feature and it is very important in a murder conditions.

The k-means clustering is one of the basic partition clustering techniques. The things of similar criminal offenses instances are grouped collectively and are very dissimilar when compare to other groups. This algorithm mainly utilized to partition the clusters predicated on their means. Primarily number of offense conditions are grouped and specified as k clusters. The mean value is computed as the mean distance between your objects. Then range of iteration are done before convergence take place. The iterative procedure for weighing qualities and criminal offense types, future criminal offenses habits can be detected by the detectives or analysts. Unsolved offences are clustered based on decisive feature and the email address details are given to the investigators to proceed the case further. This k-mean is applicable only for numerical attributes and it is not relevant to categorical attributes.

Ak- mode clustering technique can be used for categorical qualities. In this system there are two steps such as attribute weighting phase and clustering phase. Weights of the capabilities are computed using Information Gain Proportion (IGR) value for every attribute. The best value of weight is used as decisive feature. The length between two categorical characteristics are computed by finding the differences between two situations supply the similarity actions. The analyst has establish the threshold value ± by making use of the computation consequence of similarity options.

Finally binary and altered categorical similarity methods are talked about for finding similarity actions. In the info bases, attribute ideals are either numerical or categorical i. e. either quantitative or qualitative. In the quantitative (numerical), the difference between two features are computed as the direct difference between those two values of attributes. Regarding qualitative(categorical), the difference between two traits are determined as binary ideals as 0 or 1. If there is a match than attribute value will be 1 or 0 if it's not. This method is named as binary categorical method (BCS). Inside the transformed categorical in the same way (TCS) method, the similarity table has created for all your attributes and the variations between those attributes value will be calculated. This difference provides similarity options. Hence various clustering techniques are used to recognize the crime patterns which helps the criminal offenses analysts to carry on the conditions further.

V. Realization and future work

Crime data were under various data planning steps i. e cleaned out the data, solved inconsistent data and outliers are removed. Grouping criminal offense data items of clustering was needed to identify crime patterns which support criminal offense experts and law-enforcers to move forward the case in the inspection and help fixing unsolved offences faster. Similarity actions is an important factor which helps to find unsolved offences in crime style. K-means, Ak-mode and other similarity methods such as binary categorical and changed categorical methods were used to find the similarity steps of capabilities which are extremely essential to the crime analysts and law enforcement enforcers to solve unsolved offences.

In future, some of the improvements should be achieved in the existing algorithms to get an accurate results. There must be some improvement to find similar case subsets which will be a good route for solving crimes easily. Finally, concern of preparing threshold value without crime analyst may be an important activity in future.

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment