CRIME ANALYSIS MAPPING, INTRUSION DETECTION - USING DATA MINING

Authors

  • Dr A AVANI Author
  • K PRAVEEN KUMAR Author
  • K SOWMYA Author
  • V KALYANI Author

DOI:

https://doi.org/10.62643/ijerst.2025.v21.n1.pp888-895

Abstract

Data Mining is an important part of the process of Investigating Crimes.Earlier research publications have made reference to a wide variety of methods, a few examples of which include the virtual identifier, the elliptic curve algorithm, and the binary treealgorithm. Strategy for removing unwanted branches, support vector machines, and a priori VID is used to determine the relationship that exists between record and vid. In order to aid the fuzzy classification models, the apriori algorithm was developed. method, and around six hundred seconds are required to discover it. an assault using bombs sent in the mail. Within the scope of this study report, we found theAnalysis of crime maps based on the KNN algorithm (K – Nearest Neighbour) and ANN (Artificial Neural Network) are two examples of these kind of algorithms. help make this procedure easier to understand. Mapping of criminal activity is performed, and Obtainable thanks to the Office of Community-Oriented Policing's financial support Providers of (COPS). Research that is based on evidence is helpful in investigating the criminal acts. We determine the crime rate based on the following: the prior data by using various data mining methods. Crime Analysis employs quantitative and qualitative data in conjunction with analytical methods, with the purpose of solving the situations. The mapping of criminal activity is an important tool for ensuring public safety. crucial scientific field that must get attention. We are able to identify the areas with the highest rate of criminal activity with the assistance of data mining methods. Within the framework of Crime Analysis Mapping, we In order to bring down the number of reported crimes, please proceed as follows: 1) Collect criminal data 2) Group data 3) Clustering4) Making projections based on the facts.

Downloads

Published

19-02-2025

How to Cite

CRIME ANALYSIS MAPPING, INTRUSION DETECTION - USING DATA MINING. (2025). International Journal of Engineering Research and Science & Technology, 21(1), 888-895. https://doi.org/10.62643/ijerst.2025.v21.n1.pp888-895