Using Data Mining Techniques to Analyze Crime patterns in Sri Lanka National Crime Data. K.P.S.D. Kumarapathirana A

Similar documents
Programme Specification. MSc/PGDip Forensic and Legal Psychology

MSc Criminology with Forensic Psychology

A dissertation by. Clare Rachel Watsford

Criminal Justice (CJUS)

Contact Tracing in Health-care Information System - with SARS as a Case Study

THE RELATIONSHIP BETWEEN PERSONAL MEANING, SENSE OF COHERENCE AND ORGANISATIONAL COMMITMENT INGRA DU BUISSON-NARSAI

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

CMJ 3308, Mental Illness and Crime Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT ABSTRACT

GOAL SETTING FOR SUSTAINABILITY: A NEW METHOD OF ENVIRONMENTAL EDUCATION

DRUG ABUSE AND DOMESTIC VIOLENCE

The Effects of Nutrition on Reproduction in the Eastern Rainbowfish, Melanotaenia splendida splendida

BROWNING INTENSITY, COLOR DEVELOPMENT, SCAVENGING ACTIVITY OF MAILLARD REACTION PRODUCT FROM FRUCTOSE LYSINE AND GLUCOSE LYSINE MODEL SYSTEM

Kimberly A. Lonsway, PhD and Sergeant Joanne Archambault (Ret.) with contributions by Alison Jones-Lockwood. August 2006, Last updated July 2017

SpringerBriefs in Criminology

The effects of cognitive behaviour therapy for major depression in older adults

A MATHEMATICAL MODEL FOR THE SPREAD OF MALARIA CASE STUDY: CHORKOR-ACCRA. AVORDEH, TIMOTHY KING BEd (MATHEMATICS)

CRIMINOLOGY TODAY. AN INTEGRATIVE INTRODUCTION sixth edition. By FRANK SCHMALLEGER. Pearson Education, Inc.

Fasciotomy wounds associated with acute compartment syndrome - a systematic review of effective management

Misheck Ndebele. Johannesburg

DECLARATION STUDENT FOR SUPERVISORS ONLY: I have read this dissertation and approved it for examination.

Bond University. Faculty of Health Sciences and Medicine. An evaluation of mental health gains in adolescents who participate in a

Correc&ons and Post- Trauma&c Stress Symptoms

Predictive Policing: Preventing Crime with Data and Analytics

Incorporating Student Self-Reports in Functional Assessment. Desiree Villec. Bond University

Optimism in child development: Conceptual issues and methodological approaches. Edwina M. Farrall

The Relationship between Identity Processing Style and Academic

400 Hour Evaluation of Student Learning Form Concordia University Social Work Practicum Program

MSc Forensic Psychology. Joining Instructions 2018/2019

Developing an instrument to measure informed consent comprehension in non-cognitively impaired adults

Criminal Justice - Law Enforcement

Beyond childhood cancer: Bringing primary carers into focus

Seniors, Digital Spaces and Cyber Fraud Prevention EAO Webinar Series

Triandis Theory of Interpersonal Behaviour in understanding software piracy behaviour in the South African context. Julie Robinson W

CRIMINAL JUSTICE (CJ)

USE OF HYDROLYSIS PRODUCTS OF POLYETHYLENE TEREPHTHALATE SCRAPS TO PRODUCE ALKYD BASED PAINT

THE RELATIONSHIP BETWEEN PERSONALITY VARIABLES AND WORK PERFORMANCE OF CREDIT CONTROLLERS IN A BANK OLGA COETZEE

Abstract. Key words: bias, culture, Five-Factor Model, language, NEO-PI-R, NEO-PI-3, personality, South Africa

Famous or Infamous Cases in the History of Forensics. Wanted Poster

Data Mining Crime Correlations Using San Francisco Crime Open Data

Integrating evidence-based practice and performance management

TABLE OF CONTENT INTRODUCTION, HISTORIC OVERVIEW, NATIONAL AND INTERNATIONAL RESEARCH ON OFFENDER NEEDS AND RISK ASSESSMENT

arrigo 00 auto cx 1/5/05 10:53 AM Page i Police Corruption and Psychological Testing

Lassen Community College Course Outline

Making Gun Crime a Priority in Your Region. Enforcing the Laws on the Books

Limitations to yield in saline-sodic soils: Quantification of the osmotic and ionic regulations that affect the growth of crops under salinity stress

MANAGAY SHARON GOVENDER

Training on Victimization Surveys. Seong-Jin Yeon, Ph.D. Director of International Strategic Research Center Korean Institute of Criminology

THE EFFECT OF THE HOMOEOPATHIC SIMILIMUM ON SIDE EFFECTS OF CHEMOTHERAPY IN BREAST CANCER PATIENTS

Nitrate and Ammonium Interactions in Maize

IMPLANT DENTISTRY IN AUSTRALIA: THE PRESENT AND FUTURE

CRIMINAL JUSTICE (CRIMLJUS)

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

UNIVERSITY OF MALTA FACULTY FOR SOCIAL WELLBEING DEPARTMENT OF CRIMINOLOGY LECTURE PROGRAMME

Programme Specification

DOWNLOAD OR READ : INTRODUCTION TO CRIMINAL PSYCHOLOGY DEFINITIONS OF CRIME PDF EBOOK EPUB MOBI

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

RNR Principles in Practice

Ashley Nicole Hewitt, Ph.D.

Reproductive Health Care Services of Rural Women in Bangladesh: A Case Study of Belief and Attitude

Welcome to BA (Hons) Criminology

BOR 3305 PERSPECTIVES ON CRIME IN AMERICA. Eight Week Course TEXTBOOK:

Cognitive functioning in chronic fatigue syndrome

Inference Methods for First Few Hundred Studies

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

UNIVERSITY OF CALGARY. How do we measure vulvar pain? Objective measurement of a subjective parameter. Magali Berthe Marie Therese Colette Robert

EFFECTS OF SUPPLEMENTING VENDA HENS WITH VITAMIN E ON EGG PRODUCTION, HATCHABILITY AND CHICK PRODUCTIVITY M. M. MONYAMANE

Cedar Crest College CRJ 211 Criminal Justice Ethics

Title registration for a review proposal: The effects of increased police patrol on crime and disorder

The effect of backpack loading configuration and design features on postural stability, energy cost, comfort and shoulder interface pressure

Detecting and Disrupting Criminal Networks. A Data Driven Approach. P.A.C. Duijn

Apex Police Department 2016 Community Satisfaction Survey Summary

The effectiveness of allied health therapy in the symptomatic management of progressive supranuclear palsy: a systematic review

Problems: Two Decades of Research. Nylanda Lai-Han Tsang Ma. Bachelor of Psychology (Honours) School of Psychology. University of Adelaide

Mandibular distraction osteogenesis in the management of airway obstruction in children with micrognathia: a systematic review

VULNERABILITY AND EXPOSURE TO CRIME: APPLYING RISK TERRAIN MODELING

Women s use of complementary and alternative medicine for the treatment of menopause-related symptoms: A health services research study.

Criminal Justice. Criminal Justice, B.S. major Victimology Emphasis. Criminal Justice 1. Career Directions

Domestic Abuse Matters: Police responders and Champions training

TACKLING NEAR REPEAT CRIME

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Help-seeking behaviour for emotional or behavioural problems. among Australian adolescents: the role of socio-demographic

BORDERLINE PERSONALITY DISORDER IN THE ACUTE INPATIENT PSYCHIATRIC ASSESSMENT UNIT OF HELEN JOSEPH HOSPITAL

Laura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX

ARTICULATION AGREEMENT DATE DRAFTED: March 9, 2017 VALID ACADEMIC YEARS: &

Police Role in the Community. CJ Chapter 4

Rutgers University Spring 2018 Freehold Campus

Dr Edward KoKoAung Master of Clinical Science School of Translational Science Faculty of Health Sciences The University of Adelaide South Australia.

Personality traits and locus of control as predictors of work motivation Sandhya Puthanpurayil Rajan

Perception of risk of depression: The influence of optimistic bias in a non-clinical population of women

PRACTICUM STUDENT SELF EVALUATION OF ADULT PRACTICUM COMPETENCIES Counseling Psychology Program at the University of Oregon.

A Case Study of Policy and Practice in Occupational Health. and Safety in South Australia. Grant Dewar

Guidelines for the vetting of warrant applications (core competencies)

Cold Case Investigation

Presentation to The National Association of Sentencing Commissions Annual Conference August 28, 2017

Core Competencies for Peer Workers in Behavioral Health Services

Whiteside, Mary (2009) A grounded theory of empowerment in the context of Indigenous Australia. PhD thesis, James Cook University.

Police Role in the Community. James J. Drylie, Ph.D. Chapter 4

Promotion and female PDHPE teachers in the NSW DET

Transcription:

!_ & Jv OT-: j! O6 / *; a IT Oi/i34- Using Data Mining Techniques to Analyze Crime patterns in Sri Lanka National Crime Data K.P.S.D. Kumarapathirana 139169A LIBRARY UNIVERSITY or MORATL^VA, SRI LANKA r.;os ' " A Dissertation submitted to the Faculty of Information Technology, University of Moratuwa, Sri Lanka for the partial fulfillment of the requirements of the Degree of Master of Science in Information Technology. March 2016 // OOA- " 004 C oa-%) University of Moratuwa TH3169 T H 3169 H 31 6 9 r D i/. D - fzom c- -7 M 3 6o - TH I'So )

Declaration We declare that this thesis is our own work and has not been submitted in any form for another degree or diploma at any university or other institution of tertiary education. Information derived from the published or unpublished work of others has been acknowledged in the text and a list of references is given. Name of Student Signature of Student K. P. S. D. Kumarapathirana Date: - *2 Gib Supervised by Name of Supervisor Signature of Supervisor S. C. Premaratne Date: 2 / OH i

Acknowledgements I would like to express my gratitude to my supervisor, Mr. S. C. Premaratne, Senior Lecturer in University of Moratuwa, Sri Lanka whose expertise, understanding, and patience, added considerably to my research experience. I appreciate his vast knowledge and skill in many areas, and his assistance in writing reports. I would like to thank the other lecturers of University of Moratuwa, Sri Lanka, especially, Prof. Asoka Karunananda for the knowledge and assistance they provided at all levels of the research project. Moreover, a very special thank should go out to Mr. C. V. Millawithana, Criminologist, Crime Record Division, Department of Police, Sri Lanka and his staff members for assisting me in collecting data sets and giving me their valuable comments on the research goals and objectives. I would also like to thank all the batch mates of the M.Sc. in IT degree program who gave their valuable feedbacks to improve the results of the research and my family for the support they provided me through my entire life and in particular. I must acknowledge my husband and best friend, Tharindu, without whose love, encouragement and editing assistance, I would not have finished this thesis. ii

Abstract Crime is one of the dangerous factors for any country. Although crimes could occur everywhere, it is common that criminals work on crime opportunities they face in most familiar areas for them. The ultimate goal of crime analysis is to identify likely targets for police intervention and prevent crime or solve past crimes by making statistical predictions. Criminals and victims follow common life patterns and most of the time overlaps in those patterns indicate an increased likelihood of crime. Geographic and temporal features influence the where and when of those patterns. Our proposed solution consists of four major modules namely; Hotspot Analysis Module, Offender Profiling Module, Victim Profiling Module and Predicting Suspects Module. Data related to fast crimes which is used for the analysis is collected from Department of Police, Sri Lanka. Hotspot analysis module identifies crime hotspots considering geographical data of past crime where victim profiling and suspect profiling modules identify the patterns or groups of victims who are most vulnerable and suspects who share same characteristics. First three modules are developed based on simple k-means clustering algorithm where the fourth module is based on simple k-means clustering and j48 algorithm to generate the classifier model which can be used to predict the cluster of suspects of a crime. The results of this analysis can be used by law enforcers to find general and specific crime trends, patterns, and series in an ongoing, timely manner in order to take advantage of the abundance of information existing in law enforcement agencies, the criminal justice system, and public domain, to maximize the use of limited law enforcement resources, to have an objective means to access crime problems locally, regionally, nationally within and between law enforcement agencies, to be proactive in detecting and preventing crime, to meet the law enforcement needs of a changing society and to understand the criminal behaviors. iii

Table of Content Declaration Acknowledgements Abstract... Table of Content... List of Figures... List of Tables... i ii iii IV viii IX Chapter 1... Introduction to Crime Record Analysis in National Crime Records in Sri Lanka 1.1 Prolegomena....... 1.2 Background and Motivation.... 1.3 Crime and Criminology.... 1.4 Data Mining Approach.... 1.5 Crime Analysis... 1.6 Goal of the Research... 1.7 Objectives.... 1.8 Acknowledgments... 1.9 Overview of the Report.... 1.10 Summary... 1 I I 1 4 4 6 7 8 8 8 Chapter 2... State of the Art of Exploring Current Findings in Crime Record Analysis 10 10 2.1 Introduction... 10 2.2 Framework 1... 10 2.3 Framework 2... 10 2.4 Framework 3... 11 2.5 Framework 4... 11 2.6 Framework 05... 12 2.7 Framework 6 12 iv

2.8 Framework 7 2.9 Framework 8 2.10 Some Other Frameworks 2.11 Summary 12 13 13 14 Chapter 3... Technology adapted in Crime Record Analysis... 3.1 Introduction... 3.2 Methods related to predicting crimes... 3.3 Methods to identify individuals at high risk of offending in the future 3.4 Methods used to identify likely suspects of a new crime... 3.5 Methods used to identify crime victims... 3.6 Summary... 16 16 16 16 18 18 19 19 Chapter 4... A Novel Approach for Crime Record Analysis in Sri Lanka 4.1 Introduction... 4.2 Proposed Model... 4.3 System Overview... 4.4 Data Collection... 4.5 Data Integration... 4.6 Data Analysis... 4.7 Making Predictions about Potential Crimes... 4.8 Predictive Analysis with Data Mining... 4.9 Spatiotemporal Analysis... 4.10 Users... 4.11 Summary... 20 20 20 20 22 23 23 24 24 25 26 26 26 Chapter 5... Analysis and Design of the Proposed Solution 5.1 Introduction... 28 28 28 v

5.2 System Design... 5.2.1 Hot spot analysis... 5.2.2 Offender profiling. 5.2.3 Victim profiling... 5.2.4 Predicting suspects 5.3 Summary... 28 29 29 31 31 32 Chapter 6... Implementation of the Solution... 6.1 Introduction... 6.2 Weka... 6.3 Data Collection and Preprocessing... 6.4 Hot Spot Analysis and Crime Mapping 6.5 Offender Profiling... 6.6 Victim Profiling... 6.7 Predicting Suspects... 6.8 Summary... 33 33 33 3 3 33 35 39 41 43 47 Chapter 7... Evaluation... 7.1 Introduction... 7.2 Evaluation of Hotspot Analysis Module... 7.3 Evaluation of Suspect/Offender Profiling Module 7.4 Evaluation of Victim Profiling Module... 7.5 Evaluation of Suspect Prediction Module... 7.6 Summary of Evaluation... 48 48 48 48 49 51 52 57 Chapter 8.. Discussion 8.1 Introduction. 8.2 Limitations., 58 58 58 59 vi

8.3 Further Developments 59 8.4 Summary... 60 Chapter 9. 61 Reference 61 Appendix A 63 vii

Figure2.1 Flow chart for Crime Analysis [11] List of Figures 15 Figure 4.1 Proposed Model... 22 Figure 4.2 Summarized Model 23 Figure 5.1 System Design of the Proposed Solution Figure 6.1 WEKA GUI... Figure 6.2 Sample of Preprocessed Dataset... Figure 6.3 Hot spot Analysis... Figure 6.4 Identified Hotspots... Figure 6. 5 Hot Spot Analysis with k-means Clustering... Figure 6. 6 Identified Cluster Centroids of Hotspot Analysis Module... Figure 6. 7 Sample Input to the Offender Profiling Module... Figure 6. 8 Identified Cluster Centroids in Offender Profiling Module... Figure 6. 9 Sample Dataset for the Victim Profiling Module... Figure 6.10 Identified Clusters and Their Centroids in the Victim Profiling Module Figure 6.11 Summary of the new attribute cluster in the dataset... Figure 6.12 Sample Dataset for the Suspect Prediction Module... Figure 6.13 Classification Model for the Suspect Prediction Module... Figure 6.14 Evaluation of the Model for the Suspect Prediction Module... 28 34 35 36 37 38 39 40 41 42 43 44 45 46 47 Figure 7.1 Variation of Squared Errors within Clusters for Different number of clusters in Hotspot Analysis Module... 49 Figure 7.2 Variation of Squared Errors within Clusters for Different number of clusters in Suspect Profiling Module 50 Figure 7. 3 Variation of Squared Errors within Clusters for Different number of clusters in Victim Profiling Module 52 Figure 7.4 Variation of the Percentage of Correctly Classified Instances for Different number of suspect clusters in Suspect Prediction Module... 53 Figure 7.5 Variation of the Kappa Statistic for Different number of suspect clusters in Suspect Prediction Module... 54 Figure 7.6 Variation of the Mean Absolute Error for Different number of suspect clusters in Suspect Prediction Module... 54 Figure 7.7 Variation of the Root Mean Squared Error for Different Number of Suspect Clusters in Suspect Prediction Module 55 Figure 7.8 Variation of the Relative Absolute Error for Different Number of Suspect Clusters in Suspect Prediction Module... 55 Figure 7.9 Variation of the Root Relative Squared Errors for Different Number of Suspect Clusters in Suspect Prediction Module... 56 Figure 7.10 Variation of the Percentage of Correctly Classified Instances with Different Confidence Factors for J48 Algorithm in Suspect Predicting Module... 57 viii

List of Tables Table 5. IThe Meaning of Different Approach for the Crime 30 Table 5.2 The Meanings of Different Education Levels... 30 Table 7. 1 Variation of Squared Errors within Clusters for Different number of clusters in Hotspot Analysis Module 48 Table 7.2 Variation of Squared Errors within Clusters for Different number of clusters in Suspect Profiling Module 50 Table 7.3 Variation of Squared Errors within Clusters for Different number of clusters in Victim Profiling Module 51 Table 7.4 Variation of percentage of correctly classified instances, Kappa statistic, mean absolute error, root mean squared error, relative absolute error and root relative squared error of the classifier model when different number of clusters for the suspect category is used in Suspect Prediction Module 53 Table 7.5 Variation of the Percentage of Correctly Classified Instances with Different Confidence Factors for J48 Algorithm in Suspect Predicting Module 56 ix