intelligent analysis of crime data on cloud

3
International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 5, May 2015, ISSN 2348 8050 108 www.ijete.org INTELLIGENT ANALYSIS OF CRIME DATA ON CLOUD Yatish Damodare, Vinayak Gaikwad, Rani Kobal Students of BE(IT), Under the guidance of Prof. Patil S.S., Prof. Murkute P.N Al-Ameen College of engineering, Koregaon Bhima, Pune Abstract Cloud computing promises to significantly change the way we use computers and access and store our personal and business information with these new computing and communications, paradigms arise new data security challenges. The latest technological developments contributed significantly towards modernization, at the same time increased the concern about the security issues. These technologies have hindered the effective analysis about the criminals. In many countries the amount of crime incidents that is reported per day is increasing dramatically. Concerning about Sri Lanka, The department of Police is the major organization of preventing crimes. police departments is to protect the lives and property of citizens. Any act that causes loss of lives and harms people is called as crime. Crime analysis, a part of criminology, is a task that include exploring and detecting crimes and their relationships with criminals. Presently there are several crime analysis tools available in the market. This paper highlights Store the crime and criminal data on cloud use the salesforce.com platform. The aim of this project to analyse the crime and criminal data. All existing crime and criminal information easily available the police department. Then comparing the previous and present crime information police department identify the criminal a s soon as possible. In order to identify most possible suspect/ suspects for a particular misdeed the system identifies a pattern of committing the current crime and then matches it with the patterns of committing crimes by existing criminals/ suspects. I. INTRODUCTION It is impossible to find a country which has a crime- free society. As long as human beings have feelings they incline on attempting crimes. So the present society has also filled with various kinds of crimes. Conversely the criminals in today’s society use various advanced technologies and commit crimes in a really tactful ways. So that crime investigation has become a more complicated process than early days. The department of Police is the major organization of preventing crimes in Sri Lanka. It is responsible for enforcing criminal and traffic law, enhancing public safety, maintaining order and keeping the peace throughout the country. Alternatively Crime investigation has very significant role of police system in any country. With the increased complexity of crime investigation process police officers have to bear a lot of pressure than early days. The most tremendous threat for the police department in Sri Lanka is investigating crimes with the current technologies, because they still use traditional manual processes to handle crimes that are doing with the use of advanced technologies. According to statistics published by the department of police in 2010, 57560 cases have recorded from which 57381 are true cases and 26049 cases are investigation pending. In 2009 total number of recorded cases are 57340 from which 57182 are true cases and 28448 cases are investigation pending. When performing necessary calculations for above statistics police department has to handle around 157 cases per day. In order to prevent crimes police officers have to find evidences for those cases and analyze a large amount of crime related information to find responsible criminals for each crime incident. According to above statistics 47.57% cases out of total true cases are remained as investigation pending. So the requirement of an efficient way of analyzing crime related information and identifying criminals of crime incidents has arisen for providing a superior service to the society. In responding to this requirement, I have developed a system named Intelligent analysis Of Crime Data On Cloud that can potentially identify a criminal based on the evidences collected from the crime spot. For providing a better solution I decided to use Cloud technology in salesforce.com platform. All the existing crime and criminal database stored in cloud which is used Salesforce.com platform . All the existing crime and criminal information easily available the crime investigators then identify criminal as soon as possible. In order to identify most possible suspect/ suspects for a particular misdeed the system identifies a pattern of committing the current crime and then matches it with the patterns of committing crimes by existing criminals/ suspects. More specifically, we have used a clustering based model to help in identifying patterns of committing crimes by

Upload: ijeteeditor

Post on 01-Feb-2016

216 views

Category:

Documents


0 download

DESCRIPTION

Cloud computing promises to significantly change the way we use computers and access and store our personal and business information with these new computing and communications, paradigms arise new data security challenges. The latest technological developments contributed significantly towards modernization, at the same time increased the concern about the security issues. These technologies have hindered the effective analysis about the criminals. In many countries the amount of crime incidents that is reported per day is increasing dramatically. Concerning about Sri Lanka, The department of Police is the major organization of preventing crimes. police departments is to protect the lives and property of citizens. Any act that causes loss of lives and harms people is called as crime. Crime analysis, a part of criminology, is a task that include exploring and detecting crimes and their relationships with criminals. Presently there are several crime analysis tools available in the market. This paper highlights Store the crime and criminal data on cloud use the salesforce.com platform. The aim of this project to analyse the crime and criminal data. All existing crime and criminal information easily available the police department. Then comparing the previous and present crime information police department identify the criminal a s soon as possible. In order to identify most possible suspect/ suspects for a particular misdeed the system identifies a pattern of committing the current crime and then matches it with the patterns of committing crimes by existing criminals/ suspects

TRANSCRIPT

Page 1: INTELLIGENT ANALYSIS OF CRIME DATA ON CLOUD

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 – 8050

108

www.ijete.org

INTELLIGENT ANALYSIS OF CRIME DATA ON CLOUD

Yatish Damodare, Vinayak Gaikwad, Rani Kobal

Students of BE(IT),

Under the guidance of Prof. Patil S.S., Prof. Murkute P.N

Al-Ameen College of engineering, Koregaon Bhima, Pune

Abstract Cloud computing promises to significantly

change the way we use computers and access and store

our personal and business information with these new

computing and communications, paradigms arise new

data security challenges. The latest technological

developments contributed significantly towards

modernization, at the same time increased the concern

about the security issues. These technologies have

hindered the effective analysis about the criminals. In

many countries the amount of crime incidents that is

reported per day is increasing dramatically.

Concerning about Sri Lanka, The department of Police

is the major organization of preventing crimes. police

departments is to protect the lives and property of

citizens. Any act that causes loss of lives and harms

people is called as crime. Crime analysis, a part of

criminology, is a task that include exploring and

detecting crimes and their relationships with criminals.

Presently there are several crime analysis tools

available in the market. This paper highlights Store

the crime and criminal data on cloud use the

salesforce.com platform. The aim of this project to

analyse the crime and criminal data. All existing crime

and criminal information easily available the police

department. Then comparing the previous and present

crime information police department identify the

criminal a s soon as possible. In order to identify most

possible suspect/ suspects for a particular misdeed the

system identifies a pattern of committing the current

crime and then matches it with the patterns of

committing crimes by existing criminals/ suspects.

I. INTRODUCTION It is impossible to find a country which has a crime-

free society. As long as human beings have feelings

they incline on attempting crimes. So the present

society has also filled with various kinds of crimes.

Conversely the criminals in today’s society use various

advanced technologies and commit crimes in a really

tactful ways. So that crime investigation has become a

more complicated process than early days. The

department of Police is the major organization of

preventing crimes in Sri Lanka. It is responsible for

enforcing criminal and traffic law, enhancing public

safety, maintaining order and keeping the peace

throughout the country. Alternatively Crime

investigation has very significant role of police system

in any country. With the increased complexity of crime

investigation process police officers have to bear a lot

of pressure than early days. The most tremendous

threat for the police department in Sri Lanka is

investigating crimes with the current technologies,

because they still use traditional manual processes to

handle crimes that are doing with the use of advanced

technologies.

According to statistics published by the

department of police in 2010, 57560 cases have

recorded from which 57381 are true cases and 26049

cases are investigation pending. In 2009 total number

of recorded cases are 57340 from which 57182 are true

cases and 28448 cases are investigation pending.

When performing necessary calculations for above

statistics police department has to handle around 157

cases per day. In order to prevent crimes police

officers have to find evidences for those cases and

analyze a large amount of crime related information to

find responsible criminals for each crime incident.

According to above statistics 47.57% cases out of total

true cases are remained as investigation pending. So

the requirement of an efficient way of analyzing crime

related information and identifying criminals of crime

incidents has arisen for providing a superior service to

the society. In responding to this requirement, I have

developed a system named Intelligent analysis Of

Crime Data On Cloud that can potentially identify a

criminal based on the evidences collected from the

crime spot. For providing a better solution I decided to

use Cloud technology in salesforce.com platform. All

the existing crime and criminal database stored in

cloud which is used Salesforce.com platform . All the

existing crime and criminal information easily

available the crime investigators then identify criminal

as soon as possible. In order to identify most possible

suspect/ suspects for a particular misdeed the system

identifies a pattern of committing the current crime

and then matches it with the patterns of committing

crimes by existing criminals/ suspects. More

specifically, we have used a clustering based model to

help in identifying patterns of committing crimes by

Page 2: INTELLIGENT ANALYSIS OF CRIME DATA ON CLOUD

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 – 8050

109

www.ijete.org

each individual and Naïve Bayesian Classification has

used to find the most possible suspect/suspects.

II. OBJECTIVES

To provide computerized cloud storage.

Easy retrieval of crime and criminal

records.

Based on top cloud platform Salesforce.com

cloud .

Sharable data and provides actual

statistics. To provide web based and easy

analysis of data can be easily available using

cloud technology.

Search tool provided to recognize criminals

and crimes.

Police are only liable to access investigation

tool.

III. SYSTEM DESIGN 3.1 System Architecture

IAC can be divided in to several components

in order to describe the system clearly. Fig. 1 shows

those components and how they are interconnected

within the system.

A. User interface

The user interface is one of the most important

parts of any program because it determines how easily

a user can interact with the program. The goal of user

interface design is to make the user's interaction as

simple and efficient as possible, in terms of

accomplishing user goals. As a powerful program with

a poorly designed user interface has very little value,

the process of designing user interface was done very

carefully. User interface, which is one of the

components in ICIS, consists of all the web pages of

the system that are displayed to users through a web

browser.

B. Managed bean

Technically, a Managed Bean is a POJO that's

constructed and injected by the JSF framework. It's

commonly referenced by JSF pages. Thus managed

beans are used as model for UI components. They

contain the data and underlying logic of the

application. Managed beans are capable of querying

the system for entities requested by the user interface.

The system encapsulates the requested entity into an

object and returns it to the bean. The bean exposes the

object properties through a set of bean properties. This

architecture simplifies development and shields the

presentation layer from changes to the enterprise

system implementation.

Fig (1) Architecture of IAC

C. Multi agent system

This component is used for analyzing existing

information of criminals on attempting crimes and

identifying a pattern of committing crimes by them.

When user inputs relevant crime information for

finding a possible criminal, the system starts

identifying a pattern of committing that crime based on

the evidences available. The major task that was to be

done when designing this module is the proper

identification of agents and ontology. As I mentioned

earlier five types of agents were identified when

designing the system namely, message space agent,

gateway agent, prisoner agent, criminal agents and

evidence agents. Fig shows depicts the prime

interactions between each of these agents.

Message Space Agent: responsible for handling

messages over the system. This works as the

communicator between all agents of the system except

Prison agent.

Gateway Agent: acts as a gateway connecting the web

application and underlying multi-agent system.

Prison Agent: check whether the suspect is currently a

prison inmate.

Evidence Agents: responsible for identifying crime

patterns according to the evidences available in a

crime scene and for identifying criminal according to

those patterns.

Criminal Agents: responsible for calculating the

probability of committing a crime. Uses Naïve

Bayesian classification:

X = User x committing a crime

Ci = Set of evidences

Page 3: INTELLIGENT ANALYSIS OF CRIME DATA ON CLOUD

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 – 8050

110

www.ijete.org

Fig 3.2: Interaction between Agents

D. Database

Database stores all the crime and criminal

information as well as the patterns or the clusters of

crime incidents. Moreover it stores the details of ICAT

users as well.

IV. SYSTEM IMPLEMENTATION User Interface: VisualForce GUI

Hardware Required: o Processor: Dual Core

o Memory (RAM): Minimum512 MB RAM

o Hard Disk: Minimum 40 GB

o Operating System :Minimum Windows XP

Software Required: o Design Tool: StarUML

o Development Tool: Eclipse IDE

o Development Kit:Force.com SDK

o Development platform:Salesforce.com

V. CONCLUSION IAC presents a fresh methodology of

identifying a criminal by using existing evidences in

situations where any witness or forensic clues are not

present. IAC also presents a novel methodology of

identifying a criminal, in the absence of witness or any

clue by the forensic experts. Clusters are used to

identify most possible suspect/ suspects for crime

incidents.

REFERENCES

[1] F. Bellifemine, G. Caire, and D. Greenwood,

“Developing multi agent systems with JADE”, Wiley

series in Agent Technology, 2007, pp. 20-45.

[2] H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G.

Wang, R. Zheng, H. Atabakhsh, “Crime Data Mining:

An Overview and Case Studies.”; Artificial

Intelligence Lab, Department of Management

Information Systems, University of Arizona(March

2006).

[3] H. Kargupta, K. Liu, and J. Ryan, “Privacy-

Sensitive Distributed Data Mining from Multi-Party

Data,” Proc. 1st NSF/NIJ Symp. Intelligence and

Security Informatics, LNCS 2665, Springer-Verlag,

2003, pp. 336-342.April 2004.

[4] “Grave crime abstract for full year 2010 for whole

island from 01.01.2010 to 31.12.2010”, Sri Lanka

police gazette, No 1717, (August 2011).

[5] Prof. H. N. Renushe, Prof. P. R. Rasal, Prof. A. S.

Desai,” Data mining practices for effective

investigation of crime”, International Journal of

Computer Applications in Technology, Volume 3,

May 2012, pp. 865-870.

[6] http://www.alice-soft.com/html /prod _ac2 .htm.

[7] http://www.calsci.com/BrainIndex.html.

[8] U.S. Department of Justice;

http://www.icpsr.umich.edu/NACJD/RCAGIS.

[9] Abt Associates;

http://www.schoolcopsoftware.com.