Kshatri et al., 2022 - Google Patents
Crime detection approach using big data analytics and machine learningKshatri et al., 2022
View PDF- Document ID
- 13743198285282149271
- Author
- Kshatri S
- Bhonsle D
- Verma R
- Pillai A
- Moyal V
- Publication year
- Publication venue
- NeuroQuantology
External Links
Snippet
Abstract The Crime Analysis phase establishes the number of crimes and other elements such as the type of crime, murder, rape, kidnapping, etc. Various data analytics methodologies used in security and criminal investigation have shown the evolution of …
- 238000010801 machine learning 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Uddin et al. | Prediction of future terrorist activities using deep neural networks | |
Hassani et al. | A review of data mining applications in crime | |
Vural et al. | Criminal prediction using Naive Bayes theory | |
Jassim et al. | Comparative performance analysis of support vector regression and artificial neural network for prediction of municipal solid waste generation | |
Aldossari et al. | A comparative study of decision tree and naive bayes machine learning model for crime category prediction in Chicago | |
Saeed et al. | Application of machine learning algorithms in crime classification and classification rule mining | |
Kshatri et al. | Crime detection approach using big data analytics and machine learning | |
Ateş et al. | Big data, data mining, machine learning, and deep learning concepts in crime data | |
Solomon et al. | A deep learning framework for predicting burglaries based on multiple contextual factors | |
Aziz et al. | Cognizable crime rate prediction and analysis under Indian penal code using deep learning with novel optimization approach | |
Bangerter et al. | Terrorist organization identification using link prediction over heterogeneous GNN | |
Boldt et al. | Predicting burglars’ risk exposure and level of pre-crime preparation using crime scene data | |
Yin | Crime Prediction Methods Based on Machine Learning: A Survey. | |
Tundis et al. | Limits in the data for detecting criminals on social media | |
Batmaz et al. | Overview of knowledge discovery in databases process and data mining for surveillance technologies and EWS | |
Zheng et al. | Security alert: Generalized deep multi‐view representation learning for crime forecasting | |
Ribeiro et al. | Prediction of homicides in urban centers: A machine learning approach | |
Saini et al. | A Study of Lightweight Approaches to Analyze Crime Conditions in India | |
Johnson et al. | GT-CHES: Graph transformation for classification in human evolutionary systems | |
Marimbire et al. | Predicting the Effectiveness of ‘Stop and Search’Police Interventions Using Advanced Data Analytics | |
Hirithik et al. | Crime Prediction and Analysis Using Multi Layer Perceptron | |
Pattnayak et al. | Machine Learning Prediction Models on the Tendency of Criminals to Recurrence of Criminal Activities | |
Al-Osaimi | Survey of crime data analysis using the Apriori algorithm | |
Jhee et al. | Fast Prediction for Criminal Suspects through Neighbor Mutual Information‐Based Latent Network | |
Mason | Analysis of Virginia Crime Data of the Year 2016 Using Data Mining Techniques |