SlideShare a Scribd company logo
2
Most read
3
Most read
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 916
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
Roopa1, Prof. Thouseef Ulla Khan2
1PG Scholar (MCA), Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Mysore ,Karnataka, India
2Assistant Professor, Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Mysore ,Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Crime is one of our society's most serious and
pervasive problems, and preventing it is a critical duty. This
necessitates keeping note of all offences and creating a
database for future reference. The present issue is keeping a
reliable crime record and analysing this data to aid in the
prediction and resolution of futurecrimes. Theobjectiveof this
paper is to analyze dataset, which consist of numerous crimes
and predicting the type of crime, which may happen in future
depending upon various conditions. In this project, we will be
using the technique of machine learning and data science for
crime prediction of Indian crime data set. Crime analysis and
prediction is a methodical way to spotting crime. This
algorithm can anticipate and depict crime-prone areas. Using
the notion of machine learning, we may extract previously
unknown, meaningful information from unstructured data.
The extraction of new informationisanticipatedusingcurrent
datasets. Crime is a perilousand widespreadsocietalissuethat
affects people all around the world. Crime has an impact on
people's quality of life, economic prosperity, and the nation's
reputation. To safeguard their communities from crime,
modern technology and novel techniques to enhancing crime
analytics are required. We present a system that can analyse,
identify, and forecast various crime probabilities in a given
location. This study describes many sorts of criminal analysis
and crime prediction using machine learning approaches.
Key Words: Decision trees, linear regression, and k-means
clustering
1. INTRODUCTION
The crime data rate is growing on a daily basis because
current technology and high-tech ways assist criminals in
carrying out their illicit actions. Burglary, arson, and other
crimes, according to the Crime Record Bureau have
escalated, as have crimes such as murder, rape, abuse, gang
rap, and so on. Data on crime will be gathered from
numerous blogs, news sites, and websites. The massive
amount of data is utilized to create a record. A database of
crime reports. The knowledge gained via data mining
techniques will be useful in lowering crime by making it
easier to discover the perpetrators and the regions most
affected by crime.
When applied to a crime dataset, data mining techniques
produce good results. The information generated from data
mining techniques can assist the police department. The
discovery of criminal "hot spots," which show regionswitha
high concentration of crime, hasbeenprovenvaluablebythe
police. Data mining approaches can yield significantfindings
from crime report databases. Crime analysis is the first
phase in the study of crime. Criminal analysis is the
exploration, interrelationship,anddetectionofrelationships
between numerous crimesandcrimevariables.Thisanalysis
aids in the creation of statistics, queries, and maps on
demand. It also aids in determining whether a crime has
occurred in a certain recognized location.
1.1 Objectives
The prediction using data mining techniques that is
prediction rules. Frequent patterns are extracted based on
the criteria’s like crime type. Prediction is done basedonthe
previous year datasets. The prediction report consists of all
the datasets from the year 2012-2020.the year wise
comparison is shown based on the state wise datasets. The
clustering algorithm can be perform basedoneverydatasets
based on each year wise comparison is made.
1.2 Scope
The primary goals of crime evaluations are as follows: 1.
Identifying crime tendencies by study of existing crimesand
criminal information 2. Using geographic distribution to
forecast crime of available information as well as prediction
ofcrime total utilizing various datamining techniques 3.
Criminal detection
2. Existing System:
This algorithm can forecast high-risk areas for crime and
show crime-prone areas. Using the concept of data mining,
we may draw previously undiscovered, pertinent
information from unstructured data.
Disadvantages:
 They exhibited lower prediction accuracy using
this technique.
 The outcomes of this approach are not ideal.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 917
3. Planned system:
The system under consideration is a web-based application.
An advanced criminal mechanism of detection whose main
goal is to forecast crimes and their tendencies.Theproposed
system employs a data mining approach known as
"Prediction Rules" for crime pattern detection, as well as
automation for early crime pattern prediction, which helps
to avert crimes. Predicts crime trends based on past crime
information, date, and location.
Advantages:
 Conducting criminal analysis and identifying trends
in crime.
 Disseminate knowledge to help with the creation of
crime reduction and preventive measures.
 Recognize and examine recurring criminal trends to
prevent similar incidents from happening again.
 To create a data-cleaning algorithm that purges the
crime dataset of unnecessary information so that it
may be explored.
4. System Design
Designing a machine learning system's software
architecture, infrastructure, algorithms, and data to meet
specific needs is known as machine learning systems
architecture.By outlining the intricacies of how the
programme should be created, the software design will be
used to assist in the development of software for web apps.
Fig: 4.2.1Architecture Design
5. Detailed design
By outlining the specifics of how the application should be
constructed, the software design will be utilised to assist in
the software development of an android application. Use
case models, sequence diagrams, and other supplementary
requirement data are included in the software design
specifications, which are narrative and graphical
documentation of the software design
5.1 Diagram of Use Cases:
An example of a behavioural diagram in the Unified
Modelling Language (UML) is a use case diagram, which is
based on and defined by use case studies. Its purpose is to
present a graphical depiction of a system's functioning in
terms of actors, their objectives (represented as use cases),
and any connections between those use cases. The main
objective of a use case diagram is to show which system
actions are taken for a particular actor. You may display the
parts that each player in the system plays
6. Implementation
To forecast the future values of the dependent variable, a
regression algorithm is created to identify the past link
between an independent and a dependent variable.
Regression uses the historical relationship between
variables to forecast how they will behave going forward.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 918
Investigative work on the sites of high and low frequency
crimes was done using the K-means clustering technique.
6.1 Algorithm Implementation
6.1.1Regression Algorithm
A regression algorithm is designed to find the historical
relationship between an independent and a dependent
variable to predict the future values of the dependent
variable. In order to forecast future behaviour, a regression
models the historical connection between variables. The
Algorithm uses thelinearregressiontechniquesbasedon the
data set collected for the project. The linear regression
technique helps in predicting the future behavior of road
CRIME with help of the statistical methods. The algorithm
find the mean and variance value ofthedependentvariables,
and apply the formula Y=b0+b1*x to predict the future
behavior.
6.1.2 K-means Clustering
K-means clustering algorithm was used to investigate the
high and low-frequency CRIME locations. The algorithm
follows a simple and easy way to classify a given data set
through a certain number of clusters (assume k clusters)
fixed a priori. M These centroids should be placed in a
cunning way because of different location causes different
result.
6.1.3 Decision Tree:
For both prediction and classification, a decision tree is
employed. A function, which is intervals formed by splits
on the individuals' attributes value, may be trained for
classification purposes.
X
(year)
Y(value) A1=(x-
mean
of x)
B1=(y—
mean of
y)
A1
*B1
(A1)2 (b1)2
2008 3496 -4 -329 1316 16 108241
2010 3500 -3 -325 975 9 105625
2010 3987 -2 162 -324 4 26244
2011 2987 -1 -838 838 1 702244
2012 3019 0 -806 0 0 649636
2013 3999 1 174 174 1 30276
2014 4015 2 190 380 4 36100
2015 4786 3 961 2883 9 923521
2016 4018 4 193 772 16 37249
2021 4445 5 620 3100 25 384400
Fig 6.4.10To display the crime rates year in India
7. Testing
This chapter gives the various test cases performed tocheck
for the effective execution of the venture. Testing is a
procedure of cross verificationofthedesignedsystemmodel
under active state and various inputs. There are several
ways to carry out this approach. The main objective of
software development life cycle is to producea productwith
no errors or very few errors. In the processes of achieving
hassle free software we plan testing and test cases. Software
testing is done for the success of the application. The testing
is done mainly to check whether the product meet the
requirement of the user properly. It is usedtocheck the bugs
and errors in the system or to find out the defects of the
system.
7.1 Test causes with positive scenarios:
TC
No
Positive
scenario
Required
Input
Expected
output
Actual output Test
Result
1 Enter
Prediction
values
Enter a valid
values
Should
predicted
successfully
predicted
successfully
Pass
2 Enter
clustering
values
State,year,
type
Should
cluster
successfully
cluster
successfully
Pass
3 Enter
Prediction
values
Enter a valid
values
Should
predicted
successfully
Database
error
fail
4 Enter
clustering
values
State,year,
type
Should
cluster
successfully
Database
error
Fail
Conclusion
Due to a variety of variables, including a growth in poverty,
unemployment, corruption, etc., crime rates in India are
rising daily. The suggested paradigm is extremely beneficial
to both the investigating authorities and the taking the
required actions as a police officer to lower crime. The
initiative aids in the examination of these crimes by using
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 919
various interactive visualisationtechniques,crimenetworks
Future development of this project will focus on teaching
bots to identify crime hotspots using machine learning
acquiring skills. Giventhatmachinelearninganddata mining
are comparable, an advanced machine learning concept can
be applied to improve prediction. It is possible to increase
the data's dependability,correctness,andprivacyprediction.
REFERENCES:
[1] Ginger Saltos and Mihaela Coacea, 2017 International
Journal of Information Technology and Decision Making, An
Exploration of Crime Prediction Using Data Mining on Open
Data.
[2] Shiju Sathyadevan, Devan M.S, Surya Gangadharan.S,
Crime Analysis and Prediction Using First International
Conference on networks & soft computing (IEEE) 2014.
[3] Khushabu A.Bokde, Tisksha P.Kakade, Dnyaneshwari S.
Tumasare, Chetan G.Wadhai B.E Student, Crime Detection
Techniques Using and K-Means, International Journal of
Engineering Research & technology (IJERT) ,2018
[4] Crime Pattern Analysis, Visualization And Prediction
Using Data Mining, Indian Journal of Computer Science and
Engineering(IJCSE),Tushar Sonawanev,ShirinShaikh,Rahul
Shinde, and Asif Sayyad, 2015.
[5] Raj Kumar and Sakkarai Pandi, "Crime Analysis and
Prediction Using Data Mining Techniques," International
Journal of Recent Trends in Engineering & Research, 2019.
[6] Sarpreet kaur, Dr. Williamjeet Singh, Systematic review
of machine learning using python, International Journal of
Advanced Research in computer science, 2015.
[7] Kalyani Kadam and AyisheshimAlmaw,"SurveyPaper on
Crime Prediction Using Ensemble Approach," International
Journal of Pure and Applied Mathematics, 2018.
[8] Review on Crime Analysis and Prediction Using Data
Mining Techniques, International Journal of Innovative
Research in Science Engineering and Technology, 2018, by
Dr. M. Sreedevi, A. Hardhat Vardhan Reddy, and Ch. Venkata
Sai Krishna Reddy
[9] International journal of engineering, Science and
mathematics, 2017. K.S.N. Murthy, A.V.S. Pavan Kumar, and
Gangu Dharmaraju

More Related Content

PPTX
Crime Pattern Detection using K-Means Clustering
PDF
Analytics-Based Crime Prediction
PPTX
Crime prediction-using-data-mining
PPTX
Cyber security and current trends
PPTX
Machine learning in Cyber Security
PDF
Network Forensic
PPTX
Crime Detection
PPTX
Crime reduction initiatives cctv
Crime Pattern Detection using K-Means Clustering
Analytics-Based Crime Prediction
Crime prediction-using-data-mining
Cyber security and current trends
Machine learning in Cyber Security
Network Forensic
Crime Detection
Crime reduction initiatives cctv

What's hot (20)

PDF
Crime Analysis & Prediction System
PDF
San Francisco Crime Prediction Report
PPTX
Computer forensics toolkit
DOCX
Crime rate analysis using k nn in python
PPTX
Difference between Cyber and digital Forensic.pptx
PPTX
Computer forensic ppt
PPTX
B&W Image Coloring (1).pptx
PDF
Crime sensing with big data - Singapore perspective
PDF
Application for Women Safety
PPTX
Forensic imaging
PPTX
Traffic sign recognition
PPTX
Fraud detection analysis
DOCX
modeling and predicting cyber hacking breaches
PPTX
Line Detection
PDF
HunchLab 2.0 Predictive Missions: Under the Hood
PPTX
Basic malware analysis
PPT
Using Data Mining Techniques to Analyze Crime Pattern
PPTX
Artificial Intelligence in Security and Surveillance
PDF
Predictive Analysis Powerpoint Presentation Slides
PPTX
Bitcoin Price Prediction
Crime Analysis & Prediction System
San Francisco Crime Prediction Report
Computer forensics toolkit
Crime rate analysis using k nn in python
Difference between Cyber and digital Forensic.pptx
Computer forensic ppt
B&W Image Coloring (1).pptx
Crime sensing with big data - Singapore perspective
Application for Women Safety
Forensic imaging
Traffic sign recognition
Fraud detection analysis
modeling and predicting cyber hacking breaches
Line Detection
HunchLab 2.0 Predictive Missions: Under the Hood
Basic malware analysis
Using Data Mining Techniques to Analyze Crime Pattern
Artificial Intelligence in Security and Surveillance
Predictive Analysis Powerpoint Presentation Slides
Bitcoin Price Prediction
Ad

Similar to CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING (20)

PDF
CRIME EXPLORATION AND FORECAST
PDF
Predictive Modeling for Topographical Analysis of Crime Rate
PDF
Crime Prediction and Analysis
PPTX
PPT.pptx
PDF
Predictive Modeling for Topographical Analysis of Crime Rate
PDF
Survey on Crime Interpretation and Forecasting Using Machine Learning
PDF
IRJET- Crime Analysis using Data Mining and Data Analytics
PPTX
CRIME PREDICTION prediction and analysisPROJECT.pptx
PPTX
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
PDF
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
PDF
Analysis & Prediction of Crime of A Region.pdf
PDF
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
PPTX
Crime Rate Prediction for the 19 metropolitan indian cities
PDF
IRJET- Crime Prediction System
PDF
Review of Algorithms for Crime Analysis & Prediction
PDF
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
PDF
Bs4301396400
PDF
Crime Prediction and Reporting System
PDF
The International Journal of Engineering and Science (IJES)
PDF
Using machine learning algorithms to
CRIME EXPLORATION AND FORECAST
Predictive Modeling for Topographical Analysis of Crime Rate
Crime Prediction and Analysis
PPT.pptx
Predictive Modeling for Topographical Analysis of Crime Rate
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET- Crime Analysis using Data Mining and Data Analytics
CRIME PREDICTION prediction and analysisPROJECT.pptx
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
Analysis & Prediction of Crime of A Region.pdf
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
Crime Rate Prediction for the 19 metropolitan indian cities
IRJET- Crime Prediction System
Review of Algorithms for Crime Analysis & Prediction
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
Bs4301396400
Crime Prediction and Reporting System
The International Journal of Engineering and Science (IJES)
Using machine learning algorithms to
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPTX
Geodesy 1.pptx...............................................
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
web development for engineering and engineering
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Digital Logic Computer Design lecture notes
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Construction Project Organization Group 2.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
Mechanical Engineering MATERIALS Selection
Geodesy 1.pptx...............................................
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
additive manufacturing of ss316l using mig welding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT 4 Total Quality Management .pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
web development for engineering and engineering
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Digital Logic Computer Design lecture notes
CYBER-CRIMES AND SECURITY A guide to understanding
Construction Project Organization Group 2.pptx
Lecture Notes Electrical Wiring System Components
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Model Code of Practice - Construction Work - 21102022 .pdf
Foundation to blockchain - A guide to Blockchain Tech

CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 916 CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING Roopa1, Prof. Thouseef Ulla Khan2 1PG Scholar (MCA), Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Mysore ,Karnataka, India 2Assistant Professor, Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Mysore ,Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Crime is one of our society's most serious and pervasive problems, and preventing it is a critical duty. This necessitates keeping note of all offences and creating a database for future reference. The present issue is keeping a reliable crime record and analysing this data to aid in the prediction and resolution of futurecrimes. Theobjectiveof this paper is to analyze dataset, which consist of numerous crimes and predicting the type of crime, which may happen in future depending upon various conditions. In this project, we will be using the technique of machine learning and data science for crime prediction of Indian crime data set. Crime analysis and prediction is a methodical way to spotting crime. This algorithm can anticipate and depict crime-prone areas. Using the notion of machine learning, we may extract previously unknown, meaningful information from unstructured data. The extraction of new informationisanticipatedusingcurrent datasets. Crime is a perilousand widespreadsocietalissuethat affects people all around the world. Crime has an impact on people's quality of life, economic prosperity, and the nation's reputation. To safeguard their communities from crime, modern technology and novel techniques to enhancing crime analytics are required. We present a system that can analyse, identify, and forecast various crime probabilities in a given location. This study describes many sorts of criminal analysis and crime prediction using machine learning approaches. Key Words: Decision trees, linear regression, and k-means clustering 1. INTRODUCTION The crime data rate is growing on a daily basis because current technology and high-tech ways assist criminals in carrying out their illicit actions. Burglary, arson, and other crimes, according to the Crime Record Bureau have escalated, as have crimes such as murder, rape, abuse, gang rap, and so on. Data on crime will be gathered from numerous blogs, news sites, and websites. The massive amount of data is utilized to create a record. A database of crime reports. The knowledge gained via data mining techniques will be useful in lowering crime by making it easier to discover the perpetrators and the regions most affected by crime. When applied to a crime dataset, data mining techniques produce good results. The information generated from data mining techniques can assist the police department. The discovery of criminal "hot spots," which show regionswitha high concentration of crime, hasbeenprovenvaluablebythe police. Data mining approaches can yield significantfindings from crime report databases. Crime analysis is the first phase in the study of crime. Criminal analysis is the exploration, interrelationship,anddetectionofrelationships between numerous crimesandcrimevariables.Thisanalysis aids in the creation of statistics, queries, and maps on demand. It also aids in determining whether a crime has occurred in a certain recognized location. 1.1 Objectives The prediction using data mining techniques that is prediction rules. Frequent patterns are extracted based on the criteria’s like crime type. Prediction is done basedonthe previous year datasets. The prediction report consists of all the datasets from the year 2012-2020.the year wise comparison is shown based on the state wise datasets. The clustering algorithm can be perform basedoneverydatasets based on each year wise comparison is made. 1.2 Scope The primary goals of crime evaluations are as follows: 1. Identifying crime tendencies by study of existing crimesand criminal information 2. Using geographic distribution to forecast crime of available information as well as prediction ofcrime total utilizing various datamining techniques 3. Criminal detection 2. Existing System: This algorithm can forecast high-risk areas for crime and show crime-prone areas. Using the concept of data mining, we may draw previously undiscovered, pertinent information from unstructured data. Disadvantages:  They exhibited lower prediction accuracy using this technique.  The outcomes of this approach are not ideal.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 917 3. Planned system: The system under consideration is a web-based application. An advanced criminal mechanism of detection whose main goal is to forecast crimes and their tendencies.Theproposed system employs a data mining approach known as "Prediction Rules" for crime pattern detection, as well as automation for early crime pattern prediction, which helps to avert crimes. Predicts crime trends based on past crime information, date, and location. Advantages:  Conducting criminal analysis and identifying trends in crime.  Disseminate knowledge to help with the creation of crime reduction and preventive measures.  Recognize and examine recurring criminal trends to prevent similar incidents from happening again.  To create a data-cleaning algorithm that purges the crime dataset of unnecessary information so that it may be explored. 4. System Design Designing a machine learning system's software architecture, infrastructure, algorithms, and data to meet specific needs is known as machine learning systems architecture.By outlining the intricacies of how the programme should be created, the software design will be used to assist in the development of software for web apps. Fig: 4.2.1Architecture Design 5. Detailed design By outlining the specifics of how the application should be constructed, the software design will be utilised to assist in the software development of an android application. Use case models, sequence diagrams, and other supplementary requirement data are included in the software design specifications, which are narrative and graphical documentation of the software design 5.1 Diagram of Use Cases: An example of a behavioural diagram in the Unified Modelling Language (UML) is a use case diagram, which is based on and defined by use case studies. Its purpose is to present a graphical depiction of a system's functioning in terms of actors, their objectives (represented as use cases), and any connections between those use cases. The main objective of a use case diagram is to show which system actions are taken for a particular actor. You may display the parts that each player in the system plays 6. Implementation To forecast the future values of the dependent variable, a regression algorithm is created to identify the past link between an independent and a dependent variable. Regression uses the historical relationship between variables to forecast how they will behave going forward.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 918 Investigative work on the sites of high and low frequency crimes was done using the K-means clustering technique. 6.1 Algorithm Implementation 6.1.1Regression Algorithm A regression algorithm is designed to find the historical relationship between an independent and a dependent variable to predict the future values of the dependent variable. In order to forecast future behaviour, a regression models the historical connection between variables. The Algorithm uses thelinearregressiontechniquesbasedon the data set collected for the project. The linear regression technique helps in predicting the future behavior of road CRIME with help of the statistical methods. The algorithm find the mean and variance value ofthedependentvariables, and apply the formula Y=b0+b1*x to predict the future behavior. 6.1.2 K-means Clustering K-means clustering algorithm was used to investigate the high and low-frequency CRIME locations. The algorithm follows a simple and easy way to classify a given data set through a certain number of clusters (assume k clusters) fixed a priori. M These centroids should be placed in a cunning way because of different location causes different result. 6.1.3 Decision Tree: For both prediction and classification, a decision tree is employed. A function, which is intervals formed by splits on the individuals' attributes value, may be trained for classification purposes. X (year) Y(value) A1=(x- mean of x) B1=(y— mean of y) A1 *B1 (A1)2 (b1)2 2008 3496 -4 -329 1316 16 108241 2010 3500 -3 -325 975 9 105625 2010 3987 -2 162 -324 4 26244 2011 2987 -1 -838 838 1 702244 2012 3019 0 -806 0 0 649636 2013 3999 1 174 174 1 30276 2014 4015 2 190 380 4 36100 2015 4786 3 961 2883 9 923521 2016 4018 4 193 772 16 37249 2021 4445 5 620 3100 25 384400 Fig 6.4.10To display the crime rates year in India 7. Testing This chapter gives the various test cases performed tocheck for the effective execution of the venture. Testing is a procedure of cross verificationofthedesignedsystemmodel under active state and various inputs. There are several ways to carry out this approach. The main objective of software development life cycle is to producea productwith no errors or very few errors. In the processes of achieving hassle free software we plan testing and test cases. Software testing is done for the success of the application. The testing is done mainly to check whether the product meet the requirement of the user properly. It is usedtocheck the bugs and errors in the system or to find out the defects of the system. 7.1 Test causes with positive scenarios: TC No Positive scenario Required Input Expected output Actual output Test Result 1 Enter Prediction values Enter a valid values Should predicted successfully predicted successfully Pass 2 Enter clustering values State,year, type Should cluster successfully cluster successfully Pass 3 Enter Prediction values Enter a valid values Should predicted successfully Database error fail 4 Enter clustering values State,year, type Should cluster successfully Database error Fail Conclusion Due to a variety of variables, including a growth in poverty, unemployment, corruption, etc., crime rates in India are rising daily. The suggested paradigm is extremely beneficial to both the investigating authorities and the taking the required actions as a police officer to lower crime. The initiative aids in the examination of these crimes by using
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 919 various interactive visualisationtechniques,crimenetworks Future development of this project will focus on teaching bots to identify crime hotspots using machine learning acquiring skills. Giventhatmachinelearninganddata mining are comparable, an advanced machine learning concept can be applied to improve prediction. It is possible to increase the data's dependability,correctness,andprivacyprediction. REFERENCES: [1] Ginger Saltos and Mihaela Coacea, 2017 International Journal of Information Technology and Decision Making, An Exploration of Crime Prediction Using Data Mining on Open Data. [2] Shiju Sathyadevan, Devan M.S, Surya Gangadharan.S, Crime Analysis and Prediction Using First International Conference on networks & soft computing (IEEE) 2014. [3] Khushabu A.Bokde, Tisksha P.Kakade, Dnyaneshwari S. Tumasare, Chetan G.Wadhai B.E Student, Crime Detection Techniques Using and K-Means, International Journal of Engineering Research & technology (IJERT) ,2018 [4] Crime Pattern Analysis, Visualization And Prediction Using Data Mining, Indian Journal of Computer Science and Engineering(IJCSE),Tushar Sonawanev,ShirinShaikh,Rahul Shinde, and Asif Sayyad, 2015. [5] Raj Kumar and Sakkarai Pandi, "Crime Analysis and Prediction Using Data Mining Techniques," International Journal of Recent Trends in Engineering & Research, 2019. [6] Sarpreet kaur, Dr. Williamjeet Singh, Systematic review of machine learning using python, International Journal of Advanced Research in computer science, 2015. [7] Kalyani Kadam and AyisheshimAlmaw,"SurveyPaper on Crime Prediction Using Ensemble Approach," International Journal of Pure and Applied Mathematics, 2018. [8] Review on Crime Analysis and Prediction Using Data Mining Techniques, International Journal of Innovative Research in Science Engineering and Technology, 2018, by Dr. M. Sreedevi, A. Hardhat Vardhan Reddy, and Ch. Venkata Sai Krishna Reddy [9] International journal of engineering, Science and mathematics, 2017. K.S.N. Murthy, A.V.S. Pavan Kumar, and Gangu Dharmaraju