Utilizing Machine Learning Ensemble Techniques for Crime Hotspot Analysis and Prediction
DOI:
https://doi.org/10.32628/CSEIT2410313Keywords:
Machine Learning Methods, Gradient Boosting, Random Forest, Decision TreeAbstract
By combining the predictions of trained classifiers, the ensemble learning approach generates new examples through cooperative decision-making. Evidence from early analysis has demonstrated the empirical and logical superiority of ensemble classifiers over single component classifiers. It is still difficult to identify the right configuration for a given dataset, even with the presentation of many ensemble approaches. Many theories based on prediction have been developed to address the topic of machine learning crime prediction in India. The dynamic character of crimes becomes difficult to ascertain. Crime prediction aims to lower crime rates and discourage criminal action. This study provides an authentic and efficient way for determining acceptable crime predictions: the assemble-stacking based crime prediction method (SBCPM), which applies learning-based strategies to produce domain-specific configurations compared to another machine learning model. The result implies that performer models are generally not particularly successful. The ensemble model occasionally outperforms the others with the best correlation coefficient, the lowest average, and the lowest absolute errors. The proposed method generated accurate categorization on the test data. Compared to previous research that just employed violence-based crime records as a baseline, the model's prediction effect is demonstrated to be stronger. The results further shown that criminological theories are congruent with any real-world crime data. The recommended strategy also proved useful in predicting possible crimes. and show that the ensemble model has higher prediction accuracy when compared to the individual classifier.
Downloads
References
M. Cahill and G. Mulligan, ''Using geographically weighted backslide to explore close by bad behavior plans,'' Social Sci. Comput. Fire up., vol. 25, no. 2, pp. 174-193, May 2007, doi: 10.1177/0894439307298925. DOI: https://doi.org/10.1177/0894439307298925
J. M. Caplan, L. W. Kennedy, and J. Factory administrator, ''Chance domain showing: Working with criminological theory and GIS systems for bad behavior assessing,'' Value Quart., vol. 28, no. 2, pp. 360-381, Apr. 2011, doi: 10.1080/07418825.2010.486037. DOI: https://doi.org/10.1080/07418825.2010.486037
A. Almehmadi, Z. Joudaki, and R. Jalali, ''Language usage on Twitter predicts wrongdoing rates,'' in Proc. 10th Int. Conf. Secur. Inf. Netw., Oct. 2017, pp. 307-310, doi: 10.1145/3136825.3136854. DOI: https://doi.org/10.1145/3136825.3136854
V. K. Borooah and N. Ireland, ''Difficulty, violence, and battle: An assessment of Naxalite activity in the area of India,'' Int. J. Conf. Violence, vol. 2, no. 2, pp. 317-333, 2008, doi: 10.4119/UNIBI/ijcv.42.
A. Babakura, M. N. Sulaiman, and M. A. Yusuf, ''Further created strategy for request estimations for bad behavior assumption,'' in Proc. Int. Symp. Biometrics Secur. Technol. (ISBAST), Aug. 2014, pp. 250-255, doi: 10.1109/ISBAST.2014.7013130. DOI: https://doi.org/10.1109/ISBAST.2014.7013130
P. Pławiak, M. Abdar, and U. R. Acharya, ''Usage of new significant inherited overflowing outfit of SVM classifiers to expect the Australian credit scoring,'' Appl. Fragile Comput., vol. 84, Nov. 2019, Craftsmanship. no. 105740, doi: 10.1016/j.asoc.2019.105740. DOI: https://doi.org/10.1016/j.asoc.2019.105740
Z. Li, T. Zhang, Z. Yuan, Z. Wu, and Z. Du, ''Spatio-transient model assessment and assumption for metropolitan bad behavior,'' in Proc. 6th Int. Conf. Adv. Cloud Gigantic Data (CBD), Aug. 2018, pp. 177-182, doi: 10.1109/CBD.2018.00040. DOI: https://doi.org/10.1109/CBD.2018.00040
A. Almaw and K. Kadam, ''Outline paper on bad behavior conjecture using outfit approach,'' Int. J. Pure Appl. Math., vol. 118, no. 8, pp. 133-139, 2018. Online]. Available: https://inside pdf://107.93.182.66/18. pdf%0Ahttp://www.ijpam.eu
T. B. Hyde, H. Dentz, S. A. Wang, H. E. Burchett, S. Mounier-Jack, and C. F. Rack, ''The impact of new neutralizer show on inoculation and prosperity structures: A review of the disseminated composition,'' Vaccination, vol. 30, no. 45, pp. 6347-6358, 2015, doi: 10.1016/j.vaccine.2012.08.029 DOI: https://doi.org/10.1016/j.vaccine.2012.08.029
S. Yadav, M. Timbadia, A. Yadav, R. Vishwakarma, and N. Yadav, ''Bad behavior plan distinguishing proof, assessment and figure,'' in Proc. Int. Conf. Electron., Commun. Aerosp. Technol. (ICECA), Apr. 2017, pp. 225-230, doi: 10.1109/ICECA.2017.8203676. DOI: https://doi.org/10.1109/ICECA.2017.8203676
R. Groff and A. J. Braga, "Issue Arranged Policing in Unpleasant Bad behavior Spots: A Randomized Controlled Preliminary," Criminal science, vol. 53, no. 1, pp. 133-157, 2015, doi: 10.1111/1745-9125.12050. DOI: https://doi.org/10.1111/1745-9125.12050
S. A. Wheeler, J. M. Caplan, and M. Frank, "A spatial examination of social disturbance theory," Bad behavior and Wrongdoing, vol. 57, no. 2, pp. 186-216, 2011, doi: 10.1177/0011128710394405.
P. J. Brantingham and P. L. Brantingham, "Environment, routine and situation: Toward a model theory of bad behavior," Advances in Criminological Speculation, vol. 5, pp. 259-294, 1994. DOI: https://doi.org/10.4324/9781315128788-12
A. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita, "Self-invigorating point process showing of bad behavior," Journal of the American Genuine Alliance, vol. 106, no. 493, pp. 100-108, 2011, doi: 10.1198/jasa.2011.ap09546.
B. Ren and T. Chau, "Spatial and transient bad behavior connection mining," in Techniques of the seventh SIAM Overall Get-together on Data Mining, 2007, pp. 496-500, doi: 10.1137/1.9781611972771.51. DOI: https://doi.org/10.1137/1.9781611972771.51
A. Maheshwari, M. Sahai, and K. Roy, "Bad behavior estimate and assessment using data mining," in Proc. Int. Conf. Comput. Commun. Enlighten. (ICCCI), Jan. 2017, pp. 1-5, doi: 10.1109/ICCCI.2017.8117639.
K. C. Das, A. Kumari, and S. K. Panda, "Bad behavior assumption using simulated intelligence and huge data assessment," in Proc. Int. Conf. Manag. Tremendous Data Web Things (ICMBIT), Feb. 2018, pp. 1-5, doi: 10.1109/ICMBIT.2018.7560081.
M. Shuja, N. Ahmed, M. U. Ilyas, and I. Younis, "A broad investigation of simulated intelligence based approaches for bad behavior assumption and criminal revelation," Complicated and Sharp Systems, vol. 6, no. 1, pp. 21-39, 2020, doi: 10.1007/s40747-019-00114-w.
H. Liu, Y. Liu, and Z. Tang, "Anticipating bad behavior occasion from sociodemographic data," Worldwide Journal of Topographical Information Science, vol. 30, no. 2, pp. 228-245, 2016, doi: 10.1080/13658816.2015.1083905.
G. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita, "Self-invigorating point process showing of bad behavior," Journal of the American Genuine Alliance, vol. 106, no. 493, pp. 100-108, 2011, doi: 10.1198/jasa.2011.ap09546. DOI: https://doi.org/10.1198/jasa.2011.ap09546
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.