Skip to main content
Log in

Extracting relations of crime rates through fuzzy association rules mining

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Data mining is an important technology to reveal the patterns from crime data. Although there are many researches about this topic, less work models the relations between rates of different kinds of crime. In this paper, an algorithm based on fuzzy association rules (AR) mining is proposed to discover these relations. Two datasets, which are crimes in Chicago from 2012 to 2017 and crimes in NSW from 2008 to 2012, are used for case studies. At first, crime data is preprocessed, where every kind of crime occurring in every district during every month is counted. For a crime in a combination of district and month, the membership function, which is based on hypothesis testing, is designed to evaluate the degree to which its rate is high, normal or low, and the fuzzy transactional dataset is formed. A bridge between fuzzy transactional dataset and binary AR mining algorithm is built, so those mature tools of binary AR mining can be applied to generate fuzzy ARs. In the results of case studies, the strong relations between rates of different crime can be found. There are many interesting and surprise rules, which are worthy to be further studied by domain experts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 44(4):588–608

    Article  Google Scholar 

  2. Cohen LE, Land KC (1987) Age structure and crime: symmetry versus asymmetry and the projection of crime rates through the 1990s. Am Sociol Rev 52(2):170

    Article  Google Scholar 

  3. Crutchfield RD, Geerken MR, Gove WR (2010) Crime rate and social integration: the impact of metropolitan mobility. Criminol 20(3-4):467–478

    Article  Google Scholar 

  4. Soares RR, Naritomi J (2010) Understanding high crime rates in latin america: the role of social and policy factors. Nber Chapters 47(3):19–55

    Google Scholar 

  5. Hu X, Wu J, Chen P, Sun T, Li D (2017) Impact of climate variability and change on crime rates in Tangshan, China. Sci Total Environ 609:1041

    Article  Google Scholar 

  6. Wang D, Ding W, Lo H, Stepinski T, Salazar J, Morabito M (2013) Crime hotspot mapping using the crime related factors—a spatial data mining approach. Appl Intell 39(4):772–781

    Article  Google Scholar 

  7. Phillips P, Lee I (2011) Crime analysis through spatial areal aggregated density patterns. Geoinformatica 15(1):49–74

    Article  Google Scholar 

  8. Phillips P, Lee I (2012) Mining co-distribution patterns for large crime datasets. Expert Syst Appl 39 (14):11556–11563

    Article  Google Scholar 

  9. Porter MD (2016) A statistical approach to crime linkage. Am Stat 70(2):152–165

    Article  MathSciNet  Google Scholar 

  10. Chi H, Lin Z, Jin H, Xu B, Qi M (2017) A decision support system for detecting serial crimes. Knowl-Based Syst 123(C):88– 101

    Article  Google Scholar 

  11. Wang T, Rudin C, Wagner D, Sevieri R (2013) Detecting patterns of crime with series finder. In: AAAI conference on artificial intelligence

  12. Borg A, Boldt M, Lavesson N, Melander U, Boeva V (2014) Detecting serial residential burglaries using clustering. Expert Syst Appl 41(11):5252–5266

    Article  Google Scholar 

  13. Wang T, Rudin C, Wagner D, Sevieri R (2013) Learning to detect patterns of crime. In: Joint European conference on machine learning and knowledge discovery in databases, pp 515–530

  14. Huang Y, Shekhar S, Xiong H (2004) Discovering colocation patterns from spatial data sets: a general approach. IEEE Trans Knowl Data Eng 16(12):1472–1485

    Article  Google Scholar 

  15. Nath SV (2007) Crime pattern detection using data mining

  16. Buczak AL, Gifford CM (2010) Fuzzy association rule mining for community crime pattern discovery. In: ACM SIGKDD workshop on intelligence and security informatics, p 2

  17. Vural MS, Gök M (2016) Criminal prediction using naive bayes theory. Neural Comput Applic 28(9):1–12

    Google Scholar 

  18. Wijayanto AW, Purwarianti A, Son Le H (2015) Fuzzy geographically weighted clustering using artificial bee colony: an efficient geo-demographic analysis algorithm and applications to the analysis of crime behavior in population. Appl Intell 43(2):1–22

    Google Scholar 

  19. Sukanya M, Kalaikumaran T, Karthik S (2012) Criminals and crime hotspot detection using data mining algorithms: clustering and classification. Int J Adv Res Comput Eng Technol 1(10)

  20. Wang H, Kifer D, Graif C, Li Z (2016) Crime rate inference with big data. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 635–644

  21. Chen H, Chung W, Xu JJ, Wang G (2004) Crime data mining: a general framework and some examples. Computer 37(4):50–56

    Article  Google Scholar 

  22. Xu JJ, Chen H (2005) Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201–226

    Article  MathSciNet  Google Scholar 

  23. Seidler P, Adderley R (2013) Criminal network analysis inside law enforcement agencies: a data-mining system approach under the national intelligence model. Int J Police Sci Manag 15(4):323–337

    Article  Google Scholar 

  24. Nguyen LTT, Vo B, Nguyen LTT, Fournier-Viger P, Selamat A (2017) Etarm: an efficient top-k association rule mining algorithm. Appl Intell, (5), pp 1–13

  25. Zhang Z, Pedrycz W, Huang J, Zhang Z, Pedrycz W, Huang J (2017) Efficient frequent itemsets mining through sampling and information granulation. Eng Appl Artif Intell 65:119–136

    Article  Google Scholar 

  26. Zhang Z, Pedrycz W, Huang J (2018) Efficient mining product-based fuzzy association rules through central limit theorem. Appl Soft Comput 63:235–248

    Article  Google Scholar 

  27. Hong TP, Kuo CS, Wang SL (2005) A fuzzy aprioritid mining algorithm with reduced computational time. Appl Soft Comput 5(1):1–10

    Article  Google Scholar 

  28. Lin CW, Hong TP, Lu WH (2010) Linguistic data mining with fuzzy fp-trees. Expert Syst Appl 37 (6):4560–4567

    Article  Google Scholar 

  29. Chen CH, He JS, Hong TP (2013) Moga-based fuzzy data mining with taxonomy. Knowl-Based Syst 54(4):53–65

    Article  Google Scholar 

  30. Mabu S, Ci C, Lu N, Shimada K, Hirasawa K (2010) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C Appl Rev 41(1):130–139

    Article  Google Scholar 

  31. Ho GTS, Ip WH, Wu CH, Tse YK (2012) Using a fuzzy association rule mining approach to identify the financial data association. Expert Syst Appl 39(10):9054–9063

    Article  Google Scholar 

  32. Delgado M, Marín N, Sánchez D, Vila M (2003) Fuzzy association rules: general model and applications. IEEE Trans Fuzzy Syst 11(2):214–225

    Article  Google Scholar 

  33. Chien BC, Lin ZL, Hong TP (2001) An efficient clustering algorithm for mining fuzzy quantitative association rules. In: ifsa world congress and nafips international conference, 2001. Joint, vol 3, pp 1306–1311

  34. Alcalá-Fdez J, Alcalá R, Gacto MJ, Herrera F (2009) Learning the membership function contexts for mining fuzzy association rules by using genetic algorithms. Fuzzy Sets Syst 160(7):905– 921

    Article  MathSciNet  Google Scholar 

  35. Kaya M, Alhajj R (2006) Utilizing genetic algorithms to optimize membership functions for fuzzy weighted association rules mining. Appl Intell 24(1):7–15

    Article  Google Scholar 

  36. Esmin AAA, Lambert-Torres G (2006) Fitting fuzzy membership functions using hybrid particle swarm optimization. In: IEEE International Conference on Fuzzy Systems, pp 2112–2119

  37. Fournier-Viger P, Gomariz A, Gueniche T, Soltani A, Wu CW, Tseng VS (2014) Spmf: a java open-source pattern mining library. J Mach Learn Res 15(1):3389–3393

    MATH  Google Scholar 

  38. Borgelt C Pyfim - frequent item set mining for python

  39. Crimes in chicago from 2012 - 2017. https://www.kaggle.com/currie32/crimes-in-chicago#Chicago_Crimes_2012_to_2017.csv

  40. Crimes in nsw from 2008 - 2012. http://data.gov.au/storage/f/2013-09-12T23%3A32%3A36.918Z/rci-offencebymonth.csv

  41. Bogomolov A, Lepri B, Staiano J, Oliver N, Pianesi F, Pentland A (2014) Once upon a crime:towards crime prediction from demographics and mobile data, pp 427–434

  42. Yun U, Kim D, Yoon E, Fujita H (2017) Damped window based high average utility pattern mining over data streams. Knowl-Based Syst 144:188–205

    Article  Google Scholar 

  43. Gan W, Lin JC-W, Fournier-Viger P, Chao H-C, Fujita H (2017) Extracting non-redundant correlated purchase behaviors by utility measure. Knowl-Based Syst 143:30–41

    Article  Google Scholar 

  44. Nguyen LTT, Vu VV, Lam MTH, Duong TTM, Manh LT, Nguyen TTT, Vo B, Fujita H (2019) An efficient method for mining high utility closed itemsets. Inf Sci 495:78–99

    Article  Google Scholar 

  45. Fournier-Viger P, Zhang Y, Lin JC-W, Fujita H, Koh YS (2019) Mining local and peak high utility itemsets. Inf Sci 481:344–367

    Article  MathSciNet  Google Scholar 

  46. Olive DJ (2014) Testing statistical hypotheses. Springer Texts Statist 12(1):48–52

    Google Scholar 

Download references

Acknowledgements

The work of this paper is supported by the National Key R&D Program of China (No. 2018YFC1504402) and the National Natural Science Foundation of China (No. 61703417).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongjie Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Z., Huang, J., Hao, J. et al. Extracting relations of crime rates through fuzzy association rules mining. Appl Intell 50, 448–467 (2020). https://doi.org/10.1007/s10489-019-01531-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-019-01531-3

Keywords

Navigation