Utilizing Machine Learning Ensemble Techniques for Crime Hotspot Analysis and Prediction

Authors

  • Mohammed Saifulla Department of Computer Science and Engineering, Sree Rama Engineering College, Andhra Pradesh, Tirupathi, India Author
  • G. Chandrakala Department of Computer Science and Engineering, Sree Rama Engineering College, Andhra Pradesh, Tirupathi, India Author

DOI:

https://doi.org/10.32628/CSEIT2410313

Keywords:

Machine Learning Methods, Gradient Boosting, Random Forest, Decision Tree

Abstract

By combining the predictions of trained classifiers, the ensemble learning approach generates new examples through cooperative decision-making. Evidence from early analysis has demonstrated the empirical and logical superiority of ensemble classifiers over single component classifiers. It is still difficult to identify the right configuration for a given dataset, even with the presentation of many ensemble approaches. Many theories based on prediction have been developed to address the topic of machine learning crime prediction in India. The dynamic character of crimes becomes difficult to ascertain. Crime prediction aims to lower crime rates and discourage criminal action. This study provides an authentic and efficient way for determining acceptable crime predictions: the assemble-stacking based crime prediction method (SBCPM), which applies learning-based strategies to produce domain-specific configurations compared to another machine learning model. The result implies that performer models are generally not particularly successful. The ensemble model occasionally outperforms the others with the best correlation coefficient, the lowest average, and the lowest absolute errors. The proposed method generated accurate categorization on the test data. Compared to previous research that just employed violence-based crime records as a baseline, the model's prediction effect is demonstrated to be stronger. The results further shown that criminological theories are congruent with any real-world crime data. The recommended strategy also proved useful in predicting possible crimes. and show that the ensemble model has higher prediction accuracy when compared to the individual classifier.

Downloads

Download data is not yet available.

References

M. Cahill and G. Mulligan, ''Using geographically weighted backslide to explore close by bad behavior plans,'' Social Sci. Comput. Fire up., vol. 25, no. 2, pp. 174-193, May 2007, doi: 10.1177/0894439307298925. DOI: https://doi.org/10.1177/0894439307298925

J. M. Caplan, L. W. Kennedy, and J. Factory administrator, ''Chance domain showing: Working with criminological theory and GIS systems for bad behavior assessing,'' Value Quart., vol. 28, no. 2, pp. 360-381, Apr. 2011, doi: 10.1080/07418825.2010.486037. DOI: https://doi.org/10.1080/07418825.2010.486037

A. Almehmadi, Z. Joudaki, and R. Jalali, ''Language usage on Twitter predicts wrongdoing rates,'' in Proc. 10th Int. Conf. Secur. Inf. Netw., Oct. 2017, pp. 307-310, doi: 10.1145/3136825.3136854. DOI: https://doi.org/10.1145/3136825.3136854

V. K. Borooah and N. Ireland, ''Difficulty, violence, and battle: An assessment of Naxalite activity in the area of India,'' Int. J. Conf. Violence, vol. 2, no. 2, pp. 317-333, 2008, doi: 10.4119/UNIBI/ijcv.42.

A. Babakura, M. N. Sulaiman, and M. A. Yusuf, ''Further created strategy for request estimations for bad behavior assumption,'' in Proc. Int. Symp. Biometrics Secur. Technol. (ISBAST), Aug. 2014, pp. 250-255, doi: 10.1109/ISBAST.2014.7013130. DOI: https://doi.org/10.1109/ISBAST.2014.7013130

P. Pławiak, M. Abdar, and U. R. Acharya, ''Usage of new significant inherited overflowing outfit of SVM classifiers to expect the Australian credit scoring,'' Appl. Fragile Comput., vol. 84, Nov. 2019, Craftsmanship. no. 105740, doi: 10.1016/j.asoc.2019.105740. DOI: https://doi.org/10.1016/j.asoc.2019.105740

Z. Li, T. Zhang, Z. Yuan, Z. Wu, and Z. Du, ''Spatio-transient model assessment and assumption for metropolitan bad behavior,'' in Proc. 6th Int. Conf. Adv. Cloud Gigantic Data (CBD), Aug. 2018, pp. 177-182, doi: 10.1109/CBD.2018.00040. DOI: https://doi.org/10.1109/CBD.2018.00040

A. Almaw and K. Kadam, ''Outline paper on bad behavior conjecture using outfit approach,'' Int. J. Pure Appl. Math., vol. 118, no. 8, pp. 133-139, 2018. Online]. Available: https://inside pdf://107.93.182.66/18. pdf%0Ahttp://www.ijpam.eu

T. B. Hyde, H. Dentz, S. A. Wang, H. E. Burchett, S. Mounier-Jack, and C. F. Rack, ''The impact of new neutralizer show on inoculation and prosperity structures: A review of the disseminated composition,'' Vaccination, vol. 30, no. 45, pp. 6347-6358, 2015, doi: 10.1016/j.vaccine.2012.08.029 DOI: https://doi.org/10.1016/j.vaccine.2012.08.029

S. Yadav, M. Timbadia, A. Yadav, R. Vishwakarma, and N. Yadav, ''Bad behavior plan distinguishing proof, assessment and figure,'' in Proc. Int. Conf. Electron., Commun. Aerosp. Technol. (ICECA), Apr. 2017, pp. 225-230, doi: 10.1109/ICECA.2017.8203676. DOI: https://doi.org/10.1109/ICECA.2017.8203676

R. Groff and A. J. Braga, "Issue Arranged Policing in Unpleasant Bad behavior Spots: A Randomized Controlled Preliminary," Criminal science, vol. 53, no. 1, pp. 133-157, 2015, doi: 10.1111/1745-9125.12050. DOI: https://doi.org/10.1111/1745-9125.12050

S. A. Wheeler, J. M. Caplan, and M. Frank, "A spatial examination of social disturbance theory," Bad behavior and Wrongdoing, vol. 57, no. 2, pp. 186-216, 2011, doi: 10.1177/0011128710394405.

P. J. Brantingham and P. L. Brantingham, "Environment, routine and situation: Toward a model theory of bad behavior," Advances in Criminological Speculation, vol. 5, pp. 259-294, 1994. DOI: https://doi.org/10.4324/9781315128788-12

A. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita, "Self-invigorating point process showing of bad behavior," Journal of the American Genuine Alliance, vol. 106, no. 493, pp. 100-108, 2011, doi: 10.1198/jasa.2011.ap09546.

B. Ren and T. Chau, "Spatial and transient bad behavior connection mining," in Techniques of the seventh SIAM Overall Get-together on Data Mining, 2007, pp. 496-500, doi: 10.1137/1.9781611972771.51. DOI: https://doi.org/10.1137/1.9781611972771.51

A. Maheshwari, M. Sahai, and K. Roy, "Bad behavior estimate and assessment using data mining," in Proc. Int. Conf. Comput. Commun. Enlighten. (ICCCI), Jan. 2017, pp. 1-5, doi: 10.1109/ICCCI.2017.8117639.

K. C. Das, A. Kumari, and S. K. Panda, "Bad behavior assumption using simulated intelligence and huge data assessment," in Proc. Int. Conf. Manag. Tremendous Data Web Things (ICMBIT), Feb. 2018, pp. 1-5, doi: 10.1109/ICMBIT.2018.7560081.

M. Shuja, N. Ahmed, M. U. Ilyas, and I. Younis, "A broad investigation of simulated intelligence based approaches for bad behavior assumption and criminal revelation," Complicated and Sharp Systems, vol. 6, no. 1, pp. 21-39, 2020, doi: 10.1007/s40747-019-00114-w.

H. Liu, Y. Liu, and Z. Tang, "Anticipating bad behavior occasion from sociodemographic data," Worldwide Journal of Topographical Information Science, vol. 30, no. 2, pp. 228-245, 2016, doi: 10.1080/13658816.2015.1083905.

G. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita, "Self-invigorating point process showing of bad behavior," Journal of the American Genuine Alliance, vol. 106, no. 493, pp. 100-108, 2011, doi: 10.1198/jasa.2011.ap09546. DOI: https://doi.org/10.1198/jasa.2011.ap09546

Downloads

Published

10-05-2024

Issue

Section

Research Articles

How to Cite

[1]
Mohammed Saifulla and G. Chandrakala, “Utilizing Machine Learning Ensemble Techniques for Crime Hotspot Analysis and Prediction”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 3, pp. 136–145, May 2024, doi: 10.32628/CSEIT2410313.

Similar Articles

1-10 of 262

You may also start an advanced similarity search for this article.