Fbi Crime Analysis and Prediction Using Machine Learning
Fbi Crime Analysis and Prediction Using Machine Learning
ABSTRACT 1. INTRODUCTION
Crime is one of the biggest and dominating problem Crimes are the significant threat to the
in our society and its prevention is an important task. humankind. There are many crimes that happens
Daily there are huge numbers of crimes committed regular interval of time. Perhaps it is increasing and
frequently. This requires keeping track of all the spreading at a fast and vast rate. Crimes happen from
crimes and maintaining a database for same which small village, town to big cities. Crimes are of
may be used for future reference. The current different type – robbery, murder, rape, assault,
problem faced are maintaining of proper dataset of battery, false imprisonment, kidnapping,
crime and analyzing this data to help in predicting homicide[1][2]. Since crimes are increasing there is a
and solving crimes in future. The objective of this need to solve the cases in a much faster way. The
project is to analyze dataset which consist of crime activities have been increased at a faster rate
numerous crimes and predicting the type of crime and it is the responsibility of police department to
which may happen in future depending upon various control and reduce the crime activities[3][4]. Crime
conditions. In this project, we will be using the prediction and criminal identification are the major
technique of machine learning and data science for problems to the police department as there are
crime prediction of Chicago crime data set. For this tremendous amount of crime data that exist. There is
supervised classification problem, Decision Tree, a need of technology through which the case solving
Gaussian Naive Bayes, k-NN, Logistic Regression. could be faster. The objective would be to train a
This approach involves predicting crimes classifying, model for prediction[5][6]. The training would be
pattern detection and visualization with effective done using the training data set which will be
tools and technologies. Use of past crime data trends validated using the test dataset. Building the model
helps us to correlate factors which might help will be done using better algorithm depending upon
understanding the future scope of crimes. In this the accuracy. The K-Nearest Neighbor (KNN)
work, various visualizing techniques and machine classification and other algorithm will be used for
learning algorithms are adopted for predicting the crime prediction. Visualization of dataset is done to
crime distribution over an area. In the first step, the analyze the crimes which may have occurred in the
raw datasets were processed and visualized based on country[33][34[35].
the need.
This work helps the law enforcement
Keywords: crime analysis, prediction analysis, agencies to predict and detect crimes in Chicago with
machine learning, decision trees, pattern detection. improved accuracy and thus reduces the crime
rate[7][8]. There has been tremendous increase in
machine learning algorithms that have made crime
prediction feasible based on past data. The aim of this
4. CONCLUSION
Science, vol 7154. Springer, Berlin, Science and Technology, Vol. 04, Special
Heidelberg Issue 01, pp. 147-151.
[15]. Patibandla R.S.M.L., Veeranjaneyulu N. [24]. R S M Lakshmi Patibandla, Santhi Sri
(2018), “Survey on Clustering Algorithms Kurra, Ande Prasad and N.Veeranjaneyulu,
for Unstructured Data”. In: Bhateja V., (2015), “Unstructured Data: Qualitative
Coello Coello C., Satapathy S., Pattnaik P. Analysis”, J. of Computation In Biosciences
(eds) Intelligent Engineering Informatics. And Engineering, Vol. 2,No.3,pp.1-4.
Advances in Intelligent Systems and [25]. R S M Lakshmi Patibandla, Santhi Sri Kurra
Computing, vol 695. Springer, Singapore and H.-J. Kim,(2014), “Electronic resource
[16]. Patibandla, R.S.M.L., Veeranjaneyulu, N. management using cloud computing for
(2018), “Performance Analysis of Partition libraries”, International Journal of Applied
and Evolutionary Clustering Methods on Engineering Research, Vol.9,pp. 18141-
Various Cluster Validation Criteria”, Arab J 18147.
Sci Eng ,Vol.43, pp.4379–4390. [26]. Ms.R.S.M.Lakshmi Patibandla Dr.Ande
[17]. R S M Lakshmi Patibandla, Santhi Sri Kurra Prasad and Mr.Y.R.P.Shankar,(2013),
and N.Veeranjaneyulu, (2015), “A Study on “SECURE ZONE IN CLOUD”,
Real-Time Business Intelligence and Big International Journal of Advances in
Data”,Information Engineering, Vol.4,pp.1- Computer Networks and its Security,
6. Vol.3,No.2,pp.153-157.
[18]. K. Santhisri and P.R.S.M. Lakshmi,(2015), “ [27]. Patibandla, R. S. M. Lakshmi et al., (2016),
Comparative Study on Various Security “Significance of Embedded Systems to
Algorithms in Cloud Computing”, Recent IoT.”, International Journal of Computer
Trends in Programming Languages Science and Business Informatics,
,Vol.2,No.1,pp.1-6. Vol.16,No.2,pp.15-23.
[19]. K.Santhi Sri and PRSM Lakshmi,(2017), [28]. AnveshiniDumala and S. PallamSetty.
“DDoS Attacks, Detection Parameters and (2020),“LANMAR routing protocol to
Mitigation in Cloud Environment”, support real-time communications in
IJMTST,Vol.3,No.1,pp.79-82. MANETs using Soft computing technique”,
[20]. P.R.S.M.Lakshmi,K.Santhi Sri and Dr.N. 3rd International Conference on Data
Veeranjaneyulu,(2017), “A Study on Engineering and Communication
Deployment of Web Applications Require Technology (ICDECT-2019), Springer, Vol.
Strong Consistency using Multiple Clouds”, 1079, pp. 231-243.
IJMTST,Vol.3,No.1,pp.14-17.
[21]. P.R.S.M.Lakshmi,K.Santhi Sri and [29]. AnveshiniDumala and S. PallamSetty.
M.V.Bhujanga Ra0,(2017), “Workload (2019),“Investigating the Impact of Network
Management through Load Balancing Size on LANMAR Routing Protocol in a
Algorithm in Scalable Cloud”, Multi-Hop Ad hoc Network”, i-manager’s
IJASTEMS,Vol.3,No.1,pp.239-242. Journal on Wireless Communication
[22]. K.Santhi Sri, P.R.S.M.Lakshmi, and Networks (JWCN), Volume 7, No. 4, pp.19-
M.V.Bhujanga Ra0,(2017), “A Study of 26.
Security and Privacy Attacks in Cloud [30]. AnveshiniDumala and S. PallamSetty.
Computing Environment”, (2019),“Performance analysis of LANMAR
IJASTEMS,Vol.3,No.1,pp. 235-238. routing protocol in SANET and MANET”,
[23]. R S M Lakshmi Patibandla and N. International Journal of Computer Science
Veeranjaneyulu, (2018), “Explanatory & and Engineering (IJCSE) – Vol. 7,No. 5,
Complex Analysis of Structured Data to pp.1237-1242.
Enrich Data in Analytical Appliance”, [31]. AnveshiniDumala and S. PallamSetty.
International Journal for Modern Trends in (2018), “A Comparative Study of Various
Mobility Speeds of Nodes on the