Crime Data Set Analysis Using Formal Concept Analysis (FCA): A Survey
The crime rate is incrementing day by day, and there is a need to find out which regions are more crime prostrate so that compelling actions can be taken to deflate the crime rate by providing security measures in all the regions, especially in the more crime-prone regions. This paper provides a discursive survey on techniques used for crime pattern analysis. As we know that data analytics is an umbrella term covering different aspects such as data mining and formal concept analysis, we are focusing more on pattern analysis through formal concept analysis. This paper reviews the available literature related to crime pattern analysis depicting the methods used by various researchers followed by the research gaps. In addition to that, an introduction of formal concept analysis is depicted along with a table showing data of crime in India followed by discussion, conclusion, and the proposed work. This paper would be helpful for the starters who want to start research in this area.
KeywordsConcept lattice Crime data analysis Formal concept analysis m-polar fuzzy context Three-way fuzzy context
The authors would like to thank each reviewer for their constructive comments to improve the quality of paper. Same time authors thank the Amity University management for providing an infrastructure for research and innovation.
- 1.Nath SV (2006) Crime pattern detection using data mining. In: 2006 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology workshops, 2006. WI-IAT 2006 workshops. IEEEGoogle Scholar
- 2.Brantingham PL et al (2016) Crime pattern visualizationGoogle Scholar
- 3.Zou C et al (2017) Mining and updating association rules based on fuzzy concept lattice. Future Gen Comput SystGoogle Scholar
- 5.Malik DS, Mathew S, Mordeson JN (2018) Fuzzy incidence graphs: applications to human trafficking. Inf SciGoogle Scholar
- 6.Broumi, Ullah K, Bakali A, Talea M, Singh PK, Mahmood T, Smarandache F, Bahnasse A, Patro SK, de Oliveira A (2018) Novel system and method for telephone network planning based on neutrosophic graph. Global J Comput Sci Technol 18(2):1–10 (Version 1.0)Google Scholar
- 12.Sathyadevan S, Surya Gangadharan S (2014) Crime analysis and prediction using data mining. In: 2014 first international conference on networks & soft computing (ICNSC). IEEEGoogle Scholar
- 13.Sivaranjani S, Sivakumari S, Aasha M (2016) Crime prediction and forecasting in Tamil Nadu using clustering approaches. In: International conference on emerging technological trends (ICETT). IEEEGoogle Scholar
- 14.Hamdy E et al (2015) Criminal act detection and identification model. In: 2015 seventh international conference on advanced communication and networking (ACN). IEEEGoogle Scholar
- 15.Handayanto RT et al (2012) Real-time surveillance system using pattern matching. In: 2012 sixth UKSim/AMSS European symposium on computer modeling and simulation (EMS). IEEEGoogle Scholar
- 17.Sharma M (2014) Z-CRIME: a data mining tool for the detection of suspicious criminal activities based on decision tree. In: 2014 international conference on data mining and intelligent computing (ICDMIC). IEEEGoogle Scholar
- 18.Das P, Das AK (2017) Crime analysis against women from online newspaper reports and an approach to apply it in dynamic environment. In: 2017 international conference on big data analytics computational intelligence (ICBDAC). IEEEGoogle Scholar