Law & Legal Studies

Analysis of crime detection using data mining techniques

Analysis of crime detection using data mining techniques

This paper audits a large number of different information mining procedures, particularly applications used to address violations.

Authors

Kyvalya Garikapati, School of Law, KIIT University, Bhubaneshwar, Odisha, India.

Akash Bag, School of Law, Amity University, Raipur, Chhattisgarh, India.

Sujata Newton, O.P. Jindal Global University, Sonipat, Haryana, India.

Vishal Kumar Rai, O.P. Jindal Global University, Sonipat, Haryana, India.

Summary

Data mining is a kind of data analysis technique used to analyse previously-stored crime data from various resources to identify trends in kinds and find out various patterns of crime. Governments of many countries have used this technique in recent years.

The use of data mining procedure includes the examination and evaluation at the same time large chunks of pre-existing data and to the prediction of new information, which could be helpful for various organizations, whether public or private. In this process, we can easily extract new information and predict other information by using existing datasets.

Multiple analytical methods and approaches have been used to predict data via data mining techniques. However, there are only a few methods that proved helpful in the criminological field. In addition, we can use data mining techniques to solve crimes swiftly and efficiently, and also it can be applied for the automatic notification of crimes. The problem is that there are many data mining techniques.

So, for that reason, we have to choose the most efficient technique which will increase the efficiency of crime detection and prove the most suitable. This paper audits a large number of different information mining procedures, particularly applications used to address violations.

This paper likewise illuminates different difficulties and Exploration holes in wrongdoing information mining. Likewise, the paper will likewise assist fledglings who with needing to explore wrongdoing information mining to get an understanding of the point for finding different examples and patterns in wrongdoing addressing that could be utilized properly in each circumstance.

Published in: AIP Conference Proceedings, International Conference on Advance Computing and Ingenious Technology in Engineering Science, ICACITES 2021Greater Noida30 December 2021 through 31 December 2021.

To read the full article, please click here.