Diversity based self-adaptive clusters using PSO clustering for crime data

  • Seema PatilEmail author
  • R. J. Anandhi
Original Research


Diversity is the key parameter which plays the important role in defining the exploration capability of natural computing algorithms. Poor convergence is guaranteed, once diversity has lost prematurely. It is also true that there are number of sensitive parameters available with all paradigms of natural computing, whose optimal values drives the quality of solution. In this proposed work, diversity based self-adaption has been applied to particle swarm optimization to obtain better clusters. This diversity has been achieved with parameters like inertia weight, social and cognition constant. The proposed work has been applied over numeric benchmark and cluster data set to validate. Also new algorithm has been applied on crime datasets of Karnataka and Bengaluru to determine similar and different crime characteristics.


Cluster Crime Diversity Particle swarm optimization Self-adaption 


  1. 1.
    Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery in databases. AL Mag 17:37–54Google Scholar
  2. 2.
    Das S, Abraham A (2010) Data mining and knowledge discovery handbook, 2nd edn. Springer US, New York, pp 469–504Google Scholar
  3. 3.
    Sivaranjani S, Sivakumari S (2015) Mitigating serial hot spots on crime data using interpolation method and graph measures. Int J Comput Appl (0975–8887) 126(7):17–25Google Scholar
  4. 4.
    Fister I, Yang XS, Fister I, Brest J, Fister D (2013) A brief review of nature-inspired algorithms for optimization. Elektrotehniski Vestnik 80(3):116–122zbMATHGoogle Scholar
  5. 5.
    Boratyn GM, Datta S, Datta S (2006) Biologically supervised hierarchical clustering algorithms for gene expression data. In: Engineering in Medicine and Biology Society, 28th annual international conference of the IEEE, pp 5515–5519Google Scholar
  6. 6.
    Zhang JQ, Xu L, Li J, Kang Q (2014) Integrating particle swarm optimization with learning automata to solve optimization problem in noisy environment. In: 2014 IEEE conference on systems, man, cybernetics, pp 1432–1437Google Scholar
  7. 7.
    Sun S, Li J (2013) A two-swarm cooperative particle swarm optimization. Swarm Evol Comput 15:1–18CrossRefGoogle Scholar
  8. 8.
    Tao W, Ma Y, Tian J (2012) An improved ant colony clustering algorithm. In: Information engineering and applications, lecture notes in electrical engineering, vol 154, pp 1515–1521Google Scholar
  9. 9.
    Dipali K, Anuradha T (2015) ACPSO: hydrization of ant colony and particle swarm algorithm for optimization in data clustering using multiple objective function. In: Proceeding of 2015 global conference on communication technology (GCCT 2015) IEEE, pp 854–859Google Scholar
  10. 10.
    Agarwal J, Nagpal R, Sehgal R (2013) Crime analysis using K-means clustering. Int J Comput Appl 83(4):1–4Google Scholar
  11. 11.
    Jani VH (2015) Criminal pattern identification using genetic algorithm. Int J Sci Res Dev 3(04):1345–1348 (ISSN: 2321-0613) Google Scholar
  12. 12.
    Sharma M (2014) Z CRIME: a data mining tool for the detection of suspicious criminal activities based on decision tree. In: IEEE, pp 1–6 (ISBN 978-1-4799-4674-7/14) Google Scholar
  13. 13.
    Chuang L-Y, Lin YD, Yang CH (2012) Data clustering using chaotic particle swarm optimization. Int J Comput Sci 39(2):208–213Google Scholar
  14. 14.
    Davoud S, Ellips M (2009) Particle swarm optimization methods, taxonomy and applications. Int J Comput Theory Eng 1(4):486–495Google Scholar
  15. 15.
    Sadrina A, Soltani HR, Zulkifli N, Ismail N, Ariffin MKA (2013) A review of nature based algorithms applications in green supply chain problems. Int J Eng Technol 6(3):204–211CrossRefGoogle Scholar
  16. 16.
    Neveen G, Nahed E, Mervat AN, Lamiaa B (2009) Exponential particle swarm optimization approach for improving data clustering. Int J Electr Electron Eng 3:208–212Google Scholar
  17. 17.
    Prabha KA, Visalakshi N (2014) Improved particle swarm optimization based k means clustering. In: International conference on intelligent computing applications, IEEE, pp 59–65Google Scholar
  18. 18.
    Behdad Md, Luigi Barone Md, Bennamoun Tim French (2012) Nature inspired techniques in context of fraud detection. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):1273–1290CrossRefGoogle Scholar
  19. 19.
    Saravanan M, Rakhi T, Shwetha N (2013) Enabling real time crime intelligence using mobile GIS and predication methods. In: 2013 European intelligence and security informatics conference, IEEE, pp 125–128Google Scholar
  20. 20.
    Vineeth KRS, Pandhey A, Pradhan T (2016) A novel approach for intelligence crime pattern discovery and prediction. In: 2016 international conference on advanced communication control and computing technologies (ICACCCT), pp 531–538Google Scholar
  21. 21.
    Hamdy E, Adl A, Ella A, Kim O (2015) Criminal act detection and identification model. In: 2015 7th international conference on advanced communication and networking, IEEE, pp 78–82Google Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  1. 1.Department of CSEThe Oxford College of EngineeringBangaloreIndia
  2. 2.Department of ISENew Horizon College of EngineeringBangaloreIndia

Personalised recommendations