Criminal prediction using Naive Bayes theory

Abstract The paper introduces a solution to the criminal prediction problem using Naïve Bayes theory. The criminal prediction problem is stated as finding the most likely criminal of a particular crime incident when the history of crime incidents is given with the incident-level crime data. The incident-level crime data are assumed to be given as a crime dataset where the incident date and location, crime type, criminal ID and the acquaintances are the attributes or crime parameters considered in the paper. The acquaintances are the suspects whose names are either directly involved in the incident or indirectly the acquaintances of the criminal. Acquiring the crime dataset is a difficult process in practice due to confidentiality principle. So the crime dataset is generated synthetically using the state-of-the-art methods. The proposed system is tested for the criminal prediction problem using the cross-validation, and the experimental results show that the proposed system provides high scores in finding of suspected criminals.

[1]  Chen Xiang-tao An Improved ID3 Algorithm of Decision Trees , 2009 .

[2]  Kent A. Harries,et al.  Mapping Crime: Principle And Practice , 1999 .

[3]  D.E. Brown,et al.  Improving crime data sharing and analysis tools for a Web-based Crime Analysis Toolkit: WebCAT 2.2 , 2008, 2008 IEEE Systems and Information Engineering Design Symposium.

[4]  Reda Alhajj,et al.  EFFECTIVENESS OF SUPPORT VECTOR MACHINE FOR CRIME HOT-SPOTS PREDICTION , 2008, Appl. Artif. Intell..

[5]  Mathew David Mackenzie,et al.  CDUL: Class directed unsupervised learning , 1995, Neural Computing & Applications.

[6]  Donald E. Brown,et al.  Detecting local regions of change in high-dimensional criminal or terrorist point processes , 2007, Comput. Stat. Data Anal..

[7]  Beatrice Lazzerini,et al.  Combining supervised and unsupervised learning for data clustering , 2006, Neural Computing & Applications.

[8]  Anthony G. Pipe,et al.  Naive Bayes novelty detection for a moving robot with whiskers , 2010, 2010 IEEE International Conference on Robotics and Biomimetics.

[9]  Chee Peng Lim,et al.  A review of online learning in supervised neural networks , 2014, Neural Computing and Applications.

[10]  D. Kim Rossmo,et al.  Geographic Profiling for Serial Crime Investigation , 2005 .

[11]  Anders Holst,et al.  A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior , 2013, 2013 European Intelligence and Security Informatics Conference.

[12]  Donald E. Brown,et al.  Criminal incident prediction using a point-pattern-based density model , 2003 .

[13]  Shubha Jain,et al.  Hybrid Approach for Network Intrusion Detection ntrusion Detection ntrusion Detection ntrusion Detection System U sing K K K K- -Medoid Clustering Clustering and and Naïve Bayes Classification , 2013 .

[14]  Joshua B. Plotkin,et al.  Quantifying Behavioral Data Sets of Criminal Activity , 2010, AAAI Spring Symposium: Artificial Intelligence for Development.

[15]  Manuel Ferreira,et al.  Bayesian networks in forensic identification problems , 2009 .

[16]  K. Rameshkumar,et al.  A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining , 2014 .

[17]  Yang Xiang,et al.  Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list , 2005, Decis. Support Syst..

[18]  G. Palermo,et al.  Constructing Bayesian networks for criminal profiling from limited data , 2008, Knowl. Based Syst..

[19]  Gary Higgs,et al.  Visualising space and time in crime patterns: A comparison of methods , 2007, Comput. Environ. Urban Syst..

[20]  Dario Gregori,et al.  Naïve Bayes classifiers with feature selection to predict hospitalization and complications due to objects swallowing and ingestion among European children , 2013 .

[21]  Lu Xiao,et al.  Does social network always promote entrepreneurial intentions? An empirical study in China , 2013, Neural Computing and Applications.

[22]  Yves Zenou,et al.  Working Paper No . 601 , 2003 Social Networks and Crime Decisions : The Role of Social Structure in Facilitating Delinquent Behavior , 2003 .

[23]  David V. Canter Developments in geographical offender profiling: commentary on Bayesian journey to crime. , 2009 .

[24]  Wu Wei ID3 Algorithm and C4.5 Algorithm Based on Decision Tree , 2011 .

[25]  Stefan Wermter,et al.  Knowledge Extraction from Local Function Networks , 2001, IJCAI.

[26]  Mugdha Sharma Z - CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).

[27]  Yeshwantrao Chavan,et al.  Combining Naive Bayesian and Support Vector Machine for Intrusion Detection System , 2014 .

[28]  Saeed Ayat,et al.  A comparison of artificial neural networks learning algorithms in predicting tendency for suicide , 2012, Neural Computing and Applications.

[29]  Aziz Nasridinov,et al.  A Decision Tree-Based Classification Model for Crime Prediction , 2013, ITCS.

[30]  Kathleen M. Carley,et al.  NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference , 2002, Comput. Math. Organ. Theory.

[31]  Leslie W. Kennedy,et al.  Using Dasymetric Mapping for Spatially Aggregated Crime Data , 2004 .

[32]  N. Tollenaar,et al.  Which method predicts recidivism best?: a comparison of statistical, machine learning and data mining predictive models , 2013 .

[33]  Kathleen M. Carley,et al.  NETEST: Estimating a Terrorist Network's Structure , 2002 .

[34]  Yutaka Harada,et al.  Examining the impact of the precision of address geocoding on estimated density of crime locations , 2006, Comput. Geosci..

[35]  C. Yeh,et al.  The efficacy and safety of once-daily quetiapine extended release in patients with schizophrenia switched from other antipsychotics: an open-label study in Chinese population , 2015, BMC Psychiatry.

[36]  Kadhim B. S. Aljanabi A Proposed Framework for Analyzing Crime Data Set Using Decision Tree and Simple K-Means Mining Algorithms , 2011 .

[37]  Musa Mammadov,et al.  Attribute weighted Naive Bayes classifier using a local optimization , 2014, Neural Computing and Applications.

[38]  M. Saravanan,et al.  Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods , 2013, 2013 European Intelligence and Security Informatics Conference.

[39]  Jessica Woodhams,et al.  Linking Crimes Using Behavioural Clues: Current Levels of Linking Accuracy and Strategies for Moving Forward , 2014 .

[40]  I. D. Wilson,et al.  Predicting the geo-temporal variations of crime and disorder , 2003 .

[41]  Dirk Enzmann,et al.  Official Crime Statistics and Survey Data: Comparing Trends of Youth Violence between 2000 and 2006 in Cities of the Czech Republic, Germany, Poland, Russia, and Slovenia , 2010 .

[42]  Leslie W. Kennedy,et al.  Using Dasymetric Mapping for Spatially Aggregated , 2004 .

[43]  Zeki Yetgin,et al.  Generating incident-level artificial data using GIS based crime simulation , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).

[44]  M. Graf,et al.  Predicting general criminal recidivism in mentally disordered offenders using a random forest approach , 2015, BMC Psychiatry.

[45]  Dr. M. Punithavalli,et al.  A Study on the Existing Computer Aided Crime Analysis Tools to Handle Indian State of Affairs , 2001 .

[46]  Giles Oatley,et al.  Applying the Concept of Revictimization: Using Burglars' Behaviour to Predict Houses at Risk of Future Victimization , 2003 .

[47]  Xu Li,et al.  Detecting Crime Types Using Classification Algorithms , 2014, J. Digit. Inf. Manag..

[48]  Supriya Awasare,et al.  An Efficient Approach to Detecting Phishing A Web Using K-Means and Naïve-Bayes Algorithms , 2014 .

[49]  R. Sandberg,et al.  Capturing whole-genome characteristics in short sequences using a naïve Bayesian classifier. , 2001, Genome research.

[50]  V. B. Bhagat,et al.  Effective Data Mining Approach For Crime-Terrorpattern Detection Using Clustering Algorithm Technique , 2013 .

[51]  Ying Wang,et al.  Computer Crime Forensics Based on Improved Decision Tree Algorithm , 2014, J. Networks.

[52]  Priyanka Pitale,et al.  Prediction tool for Crime Analysis , 2012 .

[53]  Martin A. Andresen Estimating the probability of local crime clusters: The impact of immediate spatial neighbors , 2011 .