SlideShare a Scribd company logo
A NETWORK SCIENCE
APPROACH ON
CRIME FORECASTING
AURORA SCHNETZER
RAJATH MAHESH
PRECAP
 Idea on How to Analyze, Visualize and Try to Forecast the Crime .
 Network is a set of defined nodes and edges, and we try to study the
pattern of the edges between nodes depending on the type of crime,
number of occurrences of the different crimes according to the date of
occurrence
 Our approach is completely trivial and we try to analyze the network
formed on the given datasets after we visualize and plot it.
 The network matrices which we use to analyze are more of a known
testing and training set of manual way, and This can implemented on a
large scale further on.
Existing Other Approaches.
 Trivial Approach as in knowing what happened before and expecting/
predicting what would happen later on.
 Data Mining Techniques:- Association Rule Mining, Support Vector
Machines, Linear Regression Methods, Neural Networks.
 Machine Learning Techniques:- Data Mining Techniques can be practically
evaluated using Machine Learning Methods.
 After Plotting the Graph about the datasets , we can Visualize it and using
the metrics, can come to conclusion about a Particular event we are trying
to forecast.
Problem Description
 Predict the occurrence of Crime using a set of already computed datasets.
 Plot the data as a network and analysis of the network.
 Understand the behavior of the networks which would form upon
visualization.
 Visualization always speeds up the process of analysis due to the fact that
A single image(Network) explains what a set of 100 lines of description of
the data would do.
 Node to Node Analysis to be done and understand the movement of the
path of the network to ease the goal of prediction
AGENDA
 Collection of Datasets
 Manual Analysis of the datasets and About the type of representation of
datasets.
 Classifying datasets and Removing Unwanted data from the Dataset.
 Finding Nodes and Formulating the Edges.
 Plotting the Network and Visualization.
 Analysis and use the results to Predict the outcomes.
Dataset Description
 We used the dataset from National Institute of Justice.
 Dataset Contains records about
-- Crime Incidents that were recorded for February 2001.
-- ( X and Y ) Co-ordinates of the places of occurrences of the crime
-- Type of Crime and The Final Case type on Dispute.
-- Category of Crimes.
-- Call Groups
-- Occurrence Type
-- Census
Continued…
 We considered 2 datasets of crime incidents on 27 & 28 February 2017.
 Total number of cases Registered were 572 and 545 Respectively.
 So total Number of Edges were Formulated as a Matrix by finding the distances
between the co-ordinates using the Euclidean Distance Formula.
Visualization
 The individual data sets When plotted Primitively as a graph actually Looked Like
what I have shown in the Next slides.
 Later we have plotted the occurrences in gephi software for visualization and
analysis.
 Used Plotly to display chart about the data-set without any classification.
 Used Gephi since it is Easy and adaptable though the size of files limited.
 Number of Nodes :- Taken into consideration was 4 in both graphs.
 Number of edges formed were :-
Histogram plot of February 28th
Histogram plot for February 27.
Visualization Graphs
For February 27th
Visualization Graphs for February 28th
Analysis
 After the visualization,
 We did the manual analysis as to how the crimes are changing in numbers
between the networks on comparison with the network weights. Which is the
number of crimes committed on both the particular days.
 SO using that like how I have stated in the paper, we can predict whether the
crimes are going to decrease or increase at particular co-ordinates which are
common on both of the networks.
Challenges
 We figured out how to go about it very late and that was the main problem.
 If we had more time, we would have been able to do a more thorough study. This would
include using more of the data set and creating more visualizations.
 Another problem that we had during this study was our lack of awareness for some of
the tools being used. With more experience of some of these tools like Gephi, we would
be able to create more intricate models.
 Without the limitation of resources, such as time and experience with tools, a more
advanced analysis of the possibility of crime prediction. This would lead to the ability to
test our model on a larger scale.
Conclusion
 The metrics we used were completely a manual approach and when we did it, we
found the approach was effective , because the network formed and implemented
was good enough to describe what we needed and expected from our approach
 This approach was implemented on just data of two days, but then ca be
implemented for large datasets.
 With this trivial approach of comparison of similar nodes taken as co-ordinates,
the results we achieved could be easily evaluated to be true.
Future Scope
 The approach which we used would work fine when evaluated manually, but when
the same approach if applied to a big dataset requires lot of time and hard core
programming implementation which we could not do.
 This can actually be the base for many more methods to develop for forecasting
crime just like data mining techniques.
References
 Guidance:- The most important Part by Professor Charalampos Chelmis
 Cell-to-Cell Activity Prediction for Smart Cities:- The IEEE paper by Blerim Cici,
Emmanouil Alimpertis, Alexander Ihler, Athina Markopoulou, University of
California, Irvine
 We used a number of resources for writing the report, which we have mentioned in
that
Thank you

More Related Content

PPTX
Final presentation
PDF
Crime Data Analysis, Visualization and Prediction using Data Mining
PDF
Crime Analysis & Prediction System
PPTX
Chicago Crime Dataset Project Proposal
PDF
Emotion Sense: From Design to Deployment
PDF
Machine Learning Approaches for Crime Pattern Detection
PDF
Predictive analysis of crime forecasting
PPTX
Crime prediction-using-data-mining
Final presentation
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Analysis & Prediction System
Chicago Crime Dataset Project Proposal
Emotion Sense: From Design to Deployment
Machine Learning Approaches for Crime Pattern Detection
Predictive analysis of crime forecasting
Crime prediction-using-data-mining

What's hot (19)

PPTX
Crime Analysis using Data Analysis
PDF
Deep Learning for Public Safety in Chicago and San Francisco
PPTX
Crime Pattern Detection using K-Means Clustering
PDF
Analytics-Based Crime Prediction
DOCX
An integrated event summarization approach for complex system management
PDF
KunGao_Resume.
PDF
Safeguarding Abila: Discovering Evolving Activist Networks
PDF
SAS Data Mining - Crime Modeling
PDF
DOCX
Crime analysis mapping, intrusion detection using data mining
PPTX
10 Steps to Optimize Your Crime Analysis
PDF
Kyung Kim
PDF
Propose Data Mining AR-GA Model to Advance Crime analysis
PPSX
06 analysis of crime
PPTX
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
PDF
User behaviour modeling for data prefetching in web applications
PDF
Data acquisition for probabilistic nearest neighbor query
PPTX
Structural Analysis of Hacktivism on Twitter
PPT
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Analysis using Data Analysis
Deep Learning for Public Safety in Chicago and San Francisco
Crime Pattern Detection using K-Means Clustering
Analytics-Based Crime Prediction
An integrated event summarization approach for complex system management
KunGao_Resume.
Safeguarding Abila: Discovering Evolving Activist Networks
SAS Data Mining - Crime Modeling
Crime analysis mapping, intrusion detection using data mining
10 Steps to Optimize Your Crime Analysis
Kyung Kim
Propose Data Mining AR-GA Model to Advance Crime analysis
06 analysis of crime
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
User behaviour modeling for data prefetching in web applications
Data acquisition for probabilistic nearest neighbor query
Structural Analysis of Hacktivism on Twitter
Crime Risk Forecasting and Predictive Analytics - Esri UC
Ad

Similar to Netsci (20)

PDF
Analysis of Crime Big Data using MapReduce
PPTX
CRIME PREDICTION prediction and analysisPROJECT.pptx
PDF
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
PPTX
Case.pptx
PDF
A predictive model for mapping crime using big data analytics
PDF
Crime Prediction and Analysis
PDF
Predictive Modeling for Topographical Analysis of Crime Rate
PDF
Bs4301396400
PDF
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
PPTX
Network Intrusion Detection (1)-converted-1.pptx
PDF
Predictive Modeling for Topographical Analysis of Crime Rate
DOCX
Crime analysis mapping, intrusion detection using data mining
PDF
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
DOCX
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
PPTX
PPT.pptx
PDF
USING MACHINE LEARNING ALGORITHMS TO ANALYZE CRIME DATA
PDF
Using machine learning algorithms to
DOCX
Crime Dataset Analysis for City of Chicago
PDF
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
PDF
IRJET- Automated Detection of Gender from Face Images
Analysis of Crime Big Data using MapReduce
CRIME PREDICTION prediction and analysisPROJECT.pptx
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
Case.pptx
A predictive model for mapping crime using big data analytics
Crime Prediction and Analysis
Predictive Modeling for Topographical Analysis of Crime Rate
Bs4301396400
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Network Intrusion Detection (1)-converted-1.pptx
Predictive Modeling for Topographical Analysis of Crime Rate
Crime analysis mapping, intrusion detection using data mining
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
PPT.pptx
USING MACHINE LEARNING ALGORITHMS TO ANALYZE CRIME DATA
Using machine learning algorithms to
Crime Dataset Analysis for City of Chicago
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IRJET- Automated Detection of Gender from Face Images
Ad

Recently uploaded (20)

PPTX
IB Computer Science - Internal Assessment.pptx
PDF
.pdf is not working space design for the following data for the following dat...
PPT
Reliability_Chapter_ presentation 1221.5784
PDF
Launch Your Data Science Career in Kochi – 2025
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
Lecture1 pattern recognition............
IB Computer Science - Internal Assessment.pptx
.pdf is not working space design for the following data for the following dat...
Reliability_Chapter_ presentation 1221.5784
Launch Your Data Science Career in Kochi – 2025
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Supervised vs unsupervised machine learning algorithms
oil_refinery_comprehensive_20250804084928 (1).pptx
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Acceptance and paychological effects of mandatory extra coach I classes.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Lecture1 pattern recognition............

Netsci

  • 1. A NETWORK SCIENCE APPROACH ON CRIME FORECASTING AURORA SCHNETZER RAJATH MAHESH
  • 2. PRECAP  Idea on How to Analyze, Visualize and Try to Forecast the Crime .  Network is a set of defined nodes and edges, and we try to study the pattern of the edges between nodes depending on the type of crime, number of occurrences of the different crimes according to the date of occurrence  Our approach is completely trivial and we try to analyze the network formed on the given datasets after we visualize and plot it.  The network matrices which we use to analyze are more of a known testing and training set of manual way, and This can implemented on a large scale further on.
  • 3. Existing Other Approaches.  Trivial Approach as in knowing what happened before and expecting/ predicting what would happen later on.  Data Mining Techniques:- Association Rule Mining, Support Vector Machines, Linear Regression Methods, Neural Networks.  Machine Learning Techniques:- Data Mining Techniques can be practically evaluated using Machine Learning Methods.  After Plotting the Graph about the datasets , we can Visualize it and using the metrics, can come to conclusion about a Particular event we are trying to forecast.
  • 4. Problem Description  Predict the occurrence of Crime using a set of already computed datasets.  Plot the data as a network and analysis of the network.  Understand the behavior of the networks which would form upon visualization.  Visualization always speeds up the process of analysis due to the fact that A single image(Network) explains what a set of 100 lines of description of the data would do.  Node to Node Analysis to be done and understand the movement of the path of the network to ease the goal of prediction
  • 5. AGENDA  Collection of Datasets  Manual Analysis of the datasets and About the type of representation of datasets.  Classifying datasets and Removing Unwanted data from the Dataset.  Finding Nodes and Formulating the Edges.  Plotting the Network and Visualization.  Analysis and use the results to Predict the outcomes.
  • 6. Dataset Description  We used the dataset from National Institute of Justice.  Dataset Contains records about -- Crime Incidents that were recorded for February 2001. -- ( X and Y ) Co-ordinates of the places of occurrences of the crime -- Type of Crime and The Final Case type on Dispute. -- Category of Crimes. -- Call Groups -- Occurrence Type -- Census
  • 7. Continued…  We considered 2 datasets of crime incidents on 27 & 28 February 2017.  Total number of cases Registered were 572 and 545 Respectively.  So total Number of Edges were Formulated as a Matrix by finding the distances between the co-ordinates using the Euclidean Distance Formula.
  • 8. Visualization  The individual data sets When plotted Primitively as a graph actually Looked Like what I have shown in the Next slides.  Later we have plotted the occurrences in gephi software for visualization and analysis.  Used Plotly to display chart about the data-set without any classification.  Used Gephi since it is Easy and adaptable though the size of files limited.  Number of Nodes :- Taken into consideration was 4 in both graphs.  Number of edges formed were :-
  • 9. Histogram plot of February 28th
  • 10. Histogram plot for February 27.
  • 12. Visualization Graphs for February 28th
  • 13. Analysis  After the visualization,  We did the manual analysis as to how the crimes are changing in numbers between the networks on comparison with the network weights. Which is the number of crimes committed on both the particular days.  SO using that like how I have stated in the paper, we can predict whether the crimes are going to decrease or increase at particular co-ordinates which are common on both of the networks.
  • 14. Challenges  We figured out how to go about it very late and that was the main problem.  If we had more time, we would have been able to do a more thorough study. This would include using more of the data set and creating more visualizations.  Another problem that we had during this study was our lack of awareness for some of the tools being used. With more experience of some of these tools like Gephi, we would be able to create more intricate models.  Without the limitation of resources, such as time and experience with tools, a more advanced analysis of the possibility of crime prediction. This would lead to the ability to test our model on a larger scale.
  • 15. Conclusion  The metrics we used were completely a manual approach and when we did it, we found the approach was effective , because the network formed and implemented was good enough to describe what we needed and expected from our approach  This approach was implemented on just data of two days, but then ca be implemented for large datasets.  With this trivial approach of comparison of similar nodes taken as co-ordinates, the results we achieved could be easily evaluated to be true.
  • 16. Future Scope  The approach which we used would work fine when evaluated manually, but when the same approach if applied to a big dataset requires lot of time and hard core programming implementation which we could not do.  This can actually be the base for many more methods to develop for forecasting crime just like data mining techniques.
  • 17. References  Guidance:- The most important Part by Professor Charalampos Chelmis  Cell-to-Cell Activity Prediction for Smart Cities:- The IEEE paper by Blerim Cici, Emmanouil Alimpertis, Alexander Ihler, Athina Markopoulou, University of California, Irvine  We used a number of resources for writing the report, which we have mentioned in that