Abstract
The paper introduces a solution to the criminal prediction problem using Naïve Bayes theory. The criminal prediction problem is stated as finding the most likely criminal of a particular crime incident when the history of crime incidents is given with the incident-level crime data. The incident-level crime data are assumed to be given as a crime dataset where the incident date and location, crime type, criminal ID and the acquaintances are the attributes or crime parameters considered in the paper. The acquaintances are the suspects whose names are either directly involved in the incident or indirectly the acquaintances of the criminal. Acquiring the crime dataset is a difficult process in practice due to confidentiality principle. So the crime dataset is generated synthetically using the state-of-the-art methods. The proposed system is tested for the criminal prediction problem using the cross-validation, and the experimental results show that the proposed system provides high scores in finding of suspected criminals.
Similar content being viewed by others
References
Ayat S, Farahani HA, Aghamohamadi M et al (2013) A comparison of artificial neural networks learning algorithms in predicting tendency for suicide. Neural Comput Appl 23:1381–1386
Pflueger MO, Franke I, Graf M et al (2015) Predicting general criminal recidivism in mentally disordered offenders using a random forest approach. BMC Psychiatry 15:1–10
Tollenaar N, Van Der Heijden PGM (2013) Which method predicts recidivism best?: a comparison of statistical, machine learning and data mining predictive models. J R Stat Soc Ser A Stat Soc 176:565–584
Ewart BW, Oatley GC (2003) Applying the concept of revictimization: using burglars’ behaviour to predict houses at risk of future victimization. Int J Police Sci Manag 5:69–84
Liu H, Brown DE (2003) Criminal incident prediction using a point-pattern-based density model. Int J Forecast 19:603–622
Corcoran JJ, Wilson ID, Ware JA (2003) Predicting the geo-temporal variations of crime and disorder. Int J Forecast 19:623–634
Harada Y, Shimada T (2006) Examining the impact of the precision of address geocoding on estimated density of crime locations. Comput Geosci 32:1096–1107
Brunsdon C, Corcoran J, Higgs G (2007) Visualising space and time in crime patterns: a comparison of methods. Comput Environ Urban Syst 31:52–75
Enzmann D, Podana Z (2010) Official crime statistics and survey data: comparing trends of youth violence between 2000 and 2006 in cities of the Czech Republic, Germany, Poland, Russia, and Slovenia. Eur J Crim Policy Res 16:191–205
Gnana RD, Punithavalliv M (2012) A study on the existing computer aided crime analysis tools to handle indian state of affairs. Int J Comput Sci Issues 9:528–532
Calhoun CC et al (2008) Improving crime data sharing and analysis tools for a web-based crime analysis toolkit: Webcat 2.2. In: Systems and information engineering design symposium SIEDS 2008, IEEE, pp 40–45
Vural MS, Gök M, Yetgin Z (2013) Generating incident-level artificial data using GIS based crime simulation. In: International conference on IEEE electronics, computer and computation (ICECCO’ 2013). Ankara, pp 239–242
Pitale P, Ambhaikar A (2012) Prediction tool for crime analysis. Int J Comput Technol Appl 3:1040–1042
Vural MS, Gök M, Yetgin Z (2014) Analysis of incident-level crime data using clustering with hybrid metrics. GAU J Appl Soc Sci 6:8–20
Al-Janabi KBS (2011) A proposed framework for analyzing crime data set using decision tree and simple k-means mining algorithms. J Kufa Math Comput 1:8–24
Khan NG, Bhagat VB (2013) Effective data mining approach for crime-terrorpattern detection using clustering algorithm technique. Int J Eng Res Technol 2:2043–2048
Andresen MA (2011) Estimating the probability of local crime clusters: the impact of immediate spatial neighbours. J Crim Justice 39:394–404
Xiang Y, Chau M, Atabakhsh H, Chen H (2005) Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. Decis Support Syst 41:69–83
Austin Police Department Office (2015). http://www.ci.austin.tx.us/police/crime.htm. Accessed 02 Sept 2015
Atlanta Police Department (2015). http://www.atlantapd.org/crimedatadownloads.aspx. Accessed 09 Sept 2015
Sun CC, Yao CL, Li X, Lee K (2014) Detecting crime types using classification algorithms. J Digit Inf Manag 12:321–327
Baumgartner K, Ferrari Palermo G (2008) Constructing Bayesian networks for criminal profiling from limited data. Knowl Based Syst 21:563–572
Andrade M, Ferreira MAM (2009) Bayesian networks in forensic identification problems. Aplimat J Appl Math 2:13–30
Canter D (2009) Developments in geographical offender profiling: commentary on Bayesian journey-to-crime modelling. J Investig Psychol Offender Profil 6:161–166
Poulsen E, Kennedy LW (2004) Using dasymetric mapping for spatially aggregated. J Quant Criminol 20:243–262
Holst A, Bjurling B (2013) A Bayesian parametric statistical anomaly detection method for finding trends and patterns in criminal behaviour. In: Intelligence and security informatics conference (EISIC) 12–14 Aug. 2013. Uppsala Sweden IEEE, pp 83–88
Jain LC, Seera M, Lim CP, Balasubramaniam P (2014) A review of online learning in supervised neural networks. Neural Comput Appl 25:491–509
Corsini P, Lazzerini B, Marcelloni F (2006) Combining supervised and unsupervised learning for data clustering. Neural Comput Appl 15:289–297
Mackenzie MD (1995) CDUL: class directed unsupervised learning. Neural Comput Appl 3:2–16
Harries K (1999) Mapping crime: principles and practice. National Institute of Justice, Washington, DC
Rossmo DK, Laverty I, Moore B (2005) Geographic profiling for serial crime investigation. In: Wang F (ed) Geographic information systems and crime analysis. Idea Group Publishing, Hershey, pp 102–104
Toole JL, Eagle N, Plotkin JB (2010) Quantifying behavioral data sets of criminal activity. In: 2010 AAAI spring symposium series; March 22, 2010–March 24, 2010. Palo Alto, California, pp 91–96
Usha D, Rameshkumar KA (2014) Complete survey on application of frequent pattern mining and association rule mining on crime pattern mining. Int J Adv Comput Sci Technol 3:264–275
Upadhyaya D, Jain S (2013) Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification. Int J Comput Sci Issues 10:231–236
Wanawe K, Awasare S, Puri NV (2014) Efficient approach to detecting phishing a web using k-means and Naïve-Bayes algorithms. Int J Res Advent Technol 2:106–111
Sujatha R, Ezhilmaran D (2013) A proposal for analysis of crime based on socio-economic impact using data mining techniques. Int J Soc Appl Comput Sci 2:229–231
Ying W, Peng X, Bian J (2014) Computer crime forensics based on improved decision tree algorithm. J Netw 9:1005–1011
Sharma M (2014) Z-CRIME: a data mining tool for the detection of suspicious criminal activities based on decision tree. In: 2014 International conference on IEEE data mining and intelligent computing (ICDMIC), pp 1–6
Zhen D, Hongxiao F, Wenbiao X (2007) The algorithm of users forensics associate rules mining based on specific pattern tree. Comput Syst Appl 13:56–59
Kaise Q, Xiang-tao C (2009) An improved ID3 algorithm of decision trees. Comput Eng Sci 31:109–111
Gao Y, Liao J, Wu W (2011) ID3 algorithm and C4. 5 algorithm based on decision tree. J Hubei Univ Technol 26:54–56
Nasridinov A, Sun-Young I, Young-Ho P (2013) A decision tree-based classification model for crime prediction. In: Information technology convergence. Springer Netherlands, pp 531–538
Kianmehr K, Reda A (2008) Effectiveness of support vector machine for crime hot-spots prediction. Appl Artif Intell 22:433–458
Bennell C, Mugford R, Ellingwood H, Woodhams J (2014) Linking crimes using behavioural clues: current levels of linking accuracy and strategies for moving forward. J Investig Psychol Offender Profil 11:29–56
Dombroski MJ, Carley KM (2002) Netest: estimating a terrorist network’s structure. Comput Math Org Theory 8:235–241
Saravanan M, Thayyil R, Narayanan S (2013) Enabling real time crime intelligence using mobile GIS and prediction methods. In: 2013 European intelligence and security informatics conference IEEE, pp 125–128
Berchialla P, Francesca F, Dario G (2013) Naïve Bayes classifiers with feature selection to predict hospitalization and complications due to objects swallowing and ingestion among European children. Saf Sci 51:1–5
Lepora N et al (2010) Naive Bayes novelty detection for a moving robot with whiskers. In: 2010 IEEE international conference on robotics and biomimetics (ROBIO). IEEE, pp 131–136
Sandberg R et al (2001) Capturing whole-genome characteristics in short sequences using a naive Bayesian classifier. Genome Res 11:1404–1409
Kenneth M, Stefan W, John M (2001) Knowledge extraction from local function networks. In: International joint conference on artificial intelligence. Lawrence Erlbaum Associates Ltd, pp 765–770
Calvo-Armengol A, Zenou Y (2006) Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int Econ Rev 45:939–958
Xiao L, Fan M (2014) Does social network always promote entrepreneurial intentions? An empirical study in China. Neural Comput Appl 24:21–26
Porter MD, Brown DE (2007) Detecting local regions of change in high-dimensional criminal or terrorist point processes. Comput Stat Data Anal 51:2753–2768
Taheri S, Yearwood J, Mammadov M, Seifollahi S (2014) Attribute weighted Naive Bayes classifier using a local optimization. Neural Comput Appl 24:995–1002
Sagale AD, Kale SG (2014) Combining Naive Bayesian and support vector machine for intrusion detection system. Int J Comput Technol 1:61–65
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vural, M.S., Gök, M. Criminal prediction using Naive Bayes theory. Neural Comput & Applic 28, 2581–2592 (2017). https://doi.org/10.1007/s00521-016-2205-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-016-2205-z