Analysis of Crime Detection using Data Mining Techniques
Survey Paper | Journal Paper
Vol.7 , Issue.10 , pp.273-279, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.273279
Abstract
The In recent years the data mining is data analysing techniques that used to analyze crime data previously stored from various sources to find patterns and trends in crimes. Data Mining is the procedure which includes evaluating and examining large pre-existing databases in order to generate new information which may be essential to the organization. The extraction of new information is predicted using the existing datasets. Many approaches for analysis and prediction in data mining had been performed. But, many few efforts has made in the criminology field. In additional, it can be applied to increase efficiency in solving the crimes faster and also can be applied to automatically notify the crimes. However, there are many data mining techniques. In order to increase efficiency of crime detection, it is necessary to select the data mining techniques suitably. This paper reviews the literatures on various data mining applications, especially applications that applied to solve the crimes. Survey also throws light on research gaps and challenges of crime data mining. In additional to that, this paper provides insight about the data mining for finding the patterns and trends in crime to be used appropriately and to be a help for beginners in the research of crime data mining.
Key-Words / Index Term
Data mining; crime analysis, crime detection, criminology; Data analysis
References
[1] S. Sathyadevan, M. Devan, and S. Surya Gangadharan, “Crime analysis and prediction using data mining,” in Networks Soft Computing (ICNSC), 2014 First International Conference on, Aug 2014, pp. 406– 412.
[2] T. Pang-Ning, S. Michael, and K. Vipin, Introduction to Data Mining, 1st ed. Pearson, 5 2005.
[3] S. Kaza, Y. Wang, and H. Chen, “Suspect vehicle identification for border safety with modified mutual information,” in Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ser. ISI’06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 308–318.
[4] V. Vaithiyanathan, K. Rajeswari, R. Phalnikar, and S. Tonge, “Improved apriori algorithm based on selection criterion,” in Computational Intelligence Computing Research (ICCIC), 2012 IEEE International Conference on, Dec 2012, pp. 1–4.
[5] C. Chu-xiang, S. Jian-jing, C. Bing, S. Chang-xing, and W. Yun-cheng, “An improvement apriori arithmetic based on rough set theory,” in Circuits, Communications and System (PACCS), 2011 Third Pacific- Asia Conference on, July 2011, pp. 1–3.
[6] S. Kaza, T.Wang, H. Gowda, and H. Chen, “Target vehicle identification for border safety using mutual information,” in Intelligent Transportation Systems, 2005. Proceedings. 2005 IEEE, Sept 2005, pp. 1141–1146.
[7] W. Huang, M. Krneta, L. Lin, and J. Wu, “Association bundle – a new pattern for association analysis,” in Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on, Dec 2006, pp. 601–605.
[8] N. Sasaki, R. Nishimura, and Y. Suzuki, “Audio watermarking based on association analysis,” in Signal Processing, 2006 8th International Conference on, vol. 4, Nov 2006.
[9] A. Ben Ayed, M. Ben Halima, and A. Alimi, “Survey on clustering methods: Towards fuzzy clustering for big data,” in Soft Computing and Pattern Recognition (SoCPaR), 2014 6th International Conference of, Aug 2014, pp. 331–336.
[10] A. Thammano and P. Kesisung, “Enhancing k-means algorithm for solving classification problems,” in Mechatronics and Automation (ICMA), 2013 IEEE International Conference on, Aug 2013, pp. 1652–1656.
[11] Y. Zhao and G. Karypis, “Evaluation of hierarchical clustering algorithms for document datasets,” in Proceedings of the Eleventh International Conference on Information and Knowledge Management, ser. CIKM ’02. New York, NY, USA: ACM, 2002, pp. 515–524. [Online]. Available: http://doi.acm.org/10.1145/584792.584877
[12] C.-N. Hsu, H.-S. Huang, and B.-H. Yang, “Global and component wise extrapolation for accelerating data mining from large incomplete data sets with the em algorithm,” in Data Mining, 2006. ICDM ’06. Sixth International Conference on, Dec 2006, pp. 265–274.
[13] X.-M. Zhao, Y. ming Cheung, and D.-S. Huang, “Microarray data analysis using rival penalized em algorithm in normal mixture models,” in VLSI Design and Video Technology, 2005. Proceedings of 2005 IEEE International Workshop on, May 2005, pp. 129–132.
[14] H. Chen, W. Chung, Y. Qin, M. Chau, J. J. Xu, G. Wang, R. Zheng, and H. Atabakhsh, “Crime data mining: An overview and case studies,” in Proceedings of the 2003 Annual National Conference on Digital Government Research, ser. dg.o ’03. Digital Government Society of North America, 2003, pp. 1–5. [Online]. Available: http://dl.acm.org/citation.cfm?id=1123196.1123231
[15] R. Marikhu, J. Moonrinta, M. Ekpanyapong, M. Dailey, and S. Siddhichai, “Police eyes: Real world automated detection of traffic violations,” in Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on, May 2013, pp. 1–6.
[16] W. Cheng, X. Ji, C. Han, and J. Xi, “The mining method of the road traffic illegal data based on rough sets and association rules,” in Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, vol. 3, May 2010, pp. 856–859.
[17] U. Thongsatapornwatana and C. Chuenmanus, “Suspect vehicle detection using vehicle reputation with association analysis concept,” in Tourism Informatics, ser. Intelligent Systems Reference Library, T. Matsuo, K. Hashimoto, and H. Iwamoto, Eds., vol. 90. Springer Berlin Heidelberg, 2015, pp. 151–164.
[18] A. Kondaveeti, G. Runger, H. Liu, and J. Rowe, “Extracting geographic knowledge from sensor intervention data using spatial association rules,” in Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2011 IEEE International Conference on, June 2011, pp. 127–130.
[19] C.-H. Yu, M. Ward, M. Morabito, and W. Ding, “Crime forecasting using data mining techniques,” in Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, Dec 2011, pp. 779–786.
[20] G. Yu, S. Shao, and B. Luo, “Mining crime data by using new similarity measure,” in Genetic and Evolutionary Computing, 2008. WGEC ’08. Second International Conference on, Sept 2008, pp. 389–392.
Citation
P. Dineshkumar, B. Subramani, "Analysis of Crime Detection using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.273-279, 2019.
Over Clocking Intel-i5 4670k Processor
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.280-282, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.280282
Abstract
The Intel Core i5 4670K is a Haswell processor sporting four cores, each Over-clocked at 3.4GHz. What is new about the 4670K and differentiates it from its predecessor the i5 3570K is better power consumption, and it also offers better CPU performance, as well as improving on the GPU (Graphical Processor Unit), than the 3570K, which is a good gaming processor in itself. The processor is also capable of sustaining up to four different threads, promising good performance. Now the 4670K succeeds the 3570Kilobyte and enters the CPU charts as another great gaming processor
Key-Words / Index Term
Over Clocking, Work Stations, Frequency, Graphics
References
[1]. Testing Analysis of Turbo Boost and Hyperthreading Technology for Power Consumption and Core Processing Time Clock on Microprocessor Intel Core i7 920, Jakarta: University of Indonesia 2009.
[2]. Kevin F. G. Design of Computer Systems to Maximize Functionality Performance and Efficiency in Dealing Era Desktop Computer Technology developments are Very Rapidly, Christian University Satya Discourse, 2012.
[3]. Ibrahim Ben, Analysis of Performance Processors and Overclocking on down-locking process, Jakarta: University of Indonesia 2009.
[4]. Stallings William, Computer Organization and Architecture: Designing for Performance, Pearson Education. University of Virginia, 2003.
[5]. Taufiq Imam, Analysis of Performance Overclocking Intel Core 2 Duo E7400 On Motherboard Chipset Intel P45 and P43. Yogyakarta, School of Information Management and Computer AMIKOM, 2010.
[6]. Intel Corporation Core i5 9400F 9th Generation Desktop Processor 6 Cores up to 4.1 GHz Turbo Without Graphics LGA1151 300 Series 65W Discrete Graphic Card Needed for Display.
[7]. The 8051 Microcontroller and Embedded Systems: Using Assembly and C” by Muhammad Ali Mazidi
[8]. Microprocessors and Microcontrollers: Architecture, Programming and Interfacing Using 8085, 8086 and 8051” by Soumitra Kumar Mandal
[9]. Microprocessors and Microcontrollers: Architecture, Programming and System Design 8085, 8086, 8051, 8096” by KRISHNA KANT
[10]. Advanced Microprocessors and Peripherals” by A K Ray and K M Bhurchandi.
Citation
Shaikh Zaid, Zeaul Shaikh, Chaitanya Rathod, Patel Ali, Shakila Shaikh, Shiburaj Pappu, "Over Clocking Intel-i5 4670k Processor," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.280-282, 2019.