Automated Crime Data Capturing and Criminals Matching Using Data Mining Techniques
Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.3, No. 7)Publication Date: 2017-07-28
Authors : Valaiyapathy R; Meyyappan T;
Page : 98-104
Keywords : IJMTST; ISSN:2455-3778;
Abstract
Information mining is an approach to concentrate on learning out of typically expansive informational collections. It is a way to deal with finding covered connections among information by utilizing counterfeit consciousness techniques. The extensive variety of information mining applications has made it a vital field of research. Criminology is a standout amongst the most vital fields for applying information mining. Criminology is a procedure that intends to distinguish wrongdoing attributes. Really wrongdoing examination incorporates investigating and identifying violations and their associations with crooks. The high volume of wrongdoing datasets and furthermore, the many-sided quality of connections between these sorts of information have made criminology a vital field for applying information mining strategies. Recognizing wrongdoing qualities is the initial step for growing further examination. The learning that is picked up from information mining methodologies is an extremely valuable device which can help and bolster police powers. A novel approach in light of information mining strategies is proposed in this paper to remove critical elements from police account reports which are composed in plain content. By utilizing this approach, wrongdoing information can be consequently stored in databases of law implementation organizations. Additionally, SOM bunching strategy is employed in the extent of wrongdoing examination
Other Latest Articles
- Preparation and Characterization of Rubber Lining Material For 33% Diluted Hcl Acid Storage Tank
- A High Step Up DC-DC Converter for Photovoltaic Applications
- Implementation of Cluster Based Mesh Network
- A Review and Comparative Analysis on Fake Electronic Data Capture Device for Off-Line E-Commerce
- A Review on Various Encryption Techniques and Quality Metrics for Images
Last modified: 2017-07-29 01:22:44