A Review on Crime Detection and Crime Identification
Keywords:
Data mining, Machine learning, web app portal, HTML, CSS, APIAbstract
Crime Detection and Crime Identification” was built with an objective
to serve the society by creating awareness about ongoing crimes by
creating an investigation and visualizations about crime from past 8
years i.e. 2010 to 2018. Also we will help the users by finding them
the safest path. We could also show the police stations and hospitals
that way. An approach for the design and implementation of crime
detection for Jaipur using data mining techniques and machine learning
and determining the safest route. This paper is built with a user friendly
interface so as to make it easy for users at any time, here we use various
technologies like HTML, CSS, bootstrap, python, machine learning etc.
The users are also provided with other services in order to help them
by correctly planning his optimal path between source and destination.
This web-app portal provides a platform for user where they can input
the source and destination then obtain the safest path. The system is
built using machine learning algorithm which makes the system highly
reliable. The routes gets identified through API Key and the user is
suggested with suitable safest path. The scope of this project is given
to citizen of Jaipur, listed hospitals in Jaipur, Jaipur police stations and
crime agencies. The police station and crime agencies will have access to
crime analytics and police station tracker. The hospital will have access
to hospital tracker. Various database are maintained in order to handle
all the details that are required for the correct and proper statement
evaluation and their generation. Only authorized user can retrieve and
access the necessary information in order to access the information,
we need the administrator name and password.
References
DOI 10.1007/s00146-014-0539-6 Devendra Kumar
Tayal, Arti Jain, Surbhi Arora, Surbhi Agrawal, Tushar
Gupta, Nikhil Tyagi, Crime detection and criminal
identification in India using Data Mining techniques.
https://www.sisense.com/glossary/data-miningbasics/
https://www.colocationamerica.com/blog /
machinelearning-basics
https://deepai.org/machine-learning-glossaryandterms/data-visualization
Survey of data mining techniques for crime detection:
Shamaila Qayyum, Hafsa Shareef Dar.
DOI: 10.1088/1742-6596/1000/1/012046 S
Prabhakran, Shilpa Mitra :Survey of analysis of Crime
Detection Techniques using Data Mining and Machine
Learing.
Published
Issue
Section
Copyright (c) 2020 Journal of Advanced Research in Modeling and Simulation
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.