2013 8th International Conference on Computer Science &Amp; Education 2013
DOI: 10.1109/iccse.2013.6553986
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent criminal identification system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…Bogahawatte and Adikari [2] proposed an approach in which they highlighted the usage of data mining techniques, clustering and classification for effective investigation of crimes and criminal identification by developing a system named Intelligent Crime Investigation System (ICSIS) that could identify a criminal based up on the evidence collected from the crime location. They used clustering to identify the crime patterns which are used to commit crimes knowing the fact that each crime has certain patterns.…”
Section: Crime Patterns and Evidence-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bogahawatte and Adikari [2] proposed an approach in which they highlighted the usage of data mining techniques, clustering and classification for effective investigation of crimes and criminal identification by developing a system named Intelligent Crime Investigation System (ICSIS) that could identify a criminal based up on the evidence collected from the crime location. They used clustering to identify the crime patterns which are used to commit crimes knowing the fact that each crime has certain patterns.…”
Section: Crime Patterns and Evidence-based Methodsmentioning
confidence: 99%
“…When considering crime patterns and evidence based methods, there are clustering and classification based papers. Bogahawatte and Adikari [2] concentrated on using the Naïve Bayes for finding out most possible suspect. Jyoti Agarwal et al [3] on the other hand focused on crime analysis by implementing the K-Means clustering algorithm on crime dataset using rapid miner tool and the author had performed the crime analysis by considering the homicide crimes and plotting it with respect to year.…”
Section: Qualitative Analysis Of Crime Analysis and Prediction Approamentioning
confidence: 99%
“…The main advantage of this field work is to create criminal database with real attributes. Database is created in Attribute Relation File Format (ARFF) [7] [8]. Once attributes and their data type are defined, it is very easy to add records.…”
Section: Techniquesmentioning
confidence: 99%
“…. System design and process of PrepSearch [12] In [13] researches have introduced intelligent criminal identification system called ICIS which can potentially distinguish a criminal in accordance with the observations collected from the crime location for a certain class of crimes. The system uses existing evidences in situations for identifying a criminal by clustering mechanism to segment crime data in to subsets, and the Nave Bayesian classification has used for identifying possible suspect of crime incidents.…”
Section: Clustering By K-means Algorithmmentioning
confidence: 99%