Intelligent Crime Analysis System Using Pyspark
DOI:
https://doi.org/10.61841/k0q8ak14Keywords:
Pyspark, Bigdata, Data MiningAbstract
Crime analysis is one of the most important activities of the majority of the intelligent and law enforcement organizations all over the world. Generally they collect domestic and foreign crime-related data (intelligence) to prevent future attacks and utilize a limited number of law enforcement resources in an optimum manner. A major challenge faced by most of the law enforcement and intelligence organizations is efficiently and accurately analyzing the growing volumes of crime-related data. The vast geographical diversity and the complexity of crime patterns have made the analyzing and recording of crime data more difficult. Data mining is a powerful tool that can be used effectively for analyzing large databases and deriving important analytical results. This paper presents an intelligent crime analysis system that is designed to overcome the above-mentioned problems. The proposed system is here; we find weather analysis along with the crime that happened, and we proposed Pyspark here to store large amounts of data for crime analysis. The proposed system consists of a rich and simplified environment that can be used effectively for processes of crime analysis.
Downloads
References
[1] Cohn, E. G. (1990). Weather and crime. British Journal of Criminology, 30, 51-64.
[2] Cotton, J. L. (1986). Ambient temperature and violent crime. Journal of Applied Social Psychology, 16,
786-801.
[3] Field, S., 1992. 1992.The Effect of Temperature on Crime. British Journal of Criminology, 32, 340-351.
[4] Harries, K. D., & Stadler, S. J. (1988). Heat and violence: New findings from Dallas field data, 1980–1981.
Journal of Applied Social Psychology, 18, 129-138.
[5] Horrocks, J., & Menclova, A. K. The Effects of Weather on Crime. 1-39.
[6] Jacob, B., & Lefgren, L., & Moretti, E. (2007). The Dynamics of Criminal Behavior: Evidence from
Weather Shocks. Journal of Human Resources, 42, (3).
[7] G. Jiji-S. Anantharadha, ―Automatic Tracking of Criminals using Data Mining Techniques‖, Journal of The
Institution of Engineers (India): Series B, 2012. 258 International Journal of Engineering & Technology.
[8] Devendra Tayal, Arti Jain, Surbhi Arora, Surbhi Agarwal, Tushar Gupta, Nikhil Tyagi, ―Crime detection
and Criminal Identification in India Using Data Mining Technique‖, Ai & Society, 2014.
[9] Shiju Sathyadevan, Devan S, Surya S, ―Crime analysis and pre-diction using data mining‖, First
International Conference on Networks & Soft Computing (ICNSC2014), 2014.
[10] Shyam Nath, ―Crime Pattern Detection Using Data Mining‖, IEEE/WIC/ACM International Conference on
Web Intelligence and Intelligent Agent Technology Workshops, 2006.
[11] Somayeh Shojaee, Aida Mustafa, Fatimah Sidi, Marzanah Jabar, ―A Study on Classification Learning
Algorithms to Predict Crime Status‖, International Journal of Digital Content Tech-nology and its
Applications (JDCTA), Volume 7, Number 9, 1-3, 2013.
[12] Dawei Wang, Wei Ding, Henry Lo, Tomasz Stepinski, Josue Salazar, Melissa Morabito, ―Crime hotspot
mapping using the crime related factors—a spatial data mining approach‖, Applied Intelligence, 2012,
[13] Chung-Hsien Yu, Max Ward, Melissa Morabito, Wei Ding, ―Crime Forecasting Using Data Mining
Techniques‖, 2011 IEEE 11th International Conference on Data Mining Workshops, 2011.
[14] Arunima Kumar, Raju Gopal, ―Data mining based crime investi-gation systems: Taxonomy and relevance‖,
2015 Global Conference on Communication Technologies (GCCT)—2015.
[15] Prajakta Yerpude and Vaishnavi Gudur, ―Predictive Modelling of Crime Dataset Using Data Mining‖, International Journal of Data Mining & Knowledge Management Process (IJDKP), Vol.7, No.4, July 2017.
[16] Mohammad Keyvanpour, Mostafa Javideh, Mohammad Ebrahimi, ―Detecting and investigating crime by means of data mining: a general crime matching framework‖, Procedia Computer Science, 2011.
[17] Ubon Thongsatapornwatana, ―A survey of data mining techniques for analyzing crime patterns‖, 2016 Second Asian Conference on Defence Technology (ACDT), 2016.
[18] P. Chamikara, D. Yapa, R. Kodituwakku, and J. Gunathilake, ―Intelligent criminal identification system,‖ International Journal of Soft Computing and Engineering, vol. 2, no. 1, pp. 175-180, 2012.
[19] H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin, and M. Chua, ―Crime data mining: a general framework and some examples,‖ IEEE Explore-Computer, vol. 37, no. 4, pp. 50-56, 2004.
[20] Crime mapping report mobile application using GIS [Online]Available: https://www.crimereports.com/
[21] A fuzzy grey cognitive maps-based intelligent security system [Online].
[22] R. Krishnamurthy and S. Kumar, ―A survey of data mining techniques for analyzing crime patterns,‖ International Journal of Data Mining Techniques and Applications, vol. 1, no. 2, pp. 117-120.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.