Skip to main content

Advertisement

Log in

Criminal prediction using Naive Bayes theory

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The paper introduces a solution to the criminal prediction problem using Naïve Bayes theory. The criminal prediction problem is stated as finding the most likely criminal of a particular crime incident when the history of crime incidents is given with the incident-level crime data. The incident-level crime data are assumed to be given as a crime dataset where the incident date and location, crime type, criminal ID and the acquaintances are the attributes or crime parameters considered in the paper. The acquaintances are the suspects whose names are either directly involved in the incident or indirectly the acquaintances of the criminal. Acquiring the crime dataset is a difficult process in practice due to confidentiality principle. So the crime dataset is generated synthetically using the state-of-the-art methods. The proposed system is tested for the criminal prediction problem using the cross-validation, and the experimental results show that the proposed system provides high scores in finding of suspected criminals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ayat S, Farahani HA, Aghamohamadi M et al (2013) A comparison of artificial neural networks learning algorithms in predicting tendency for suicide. Neural Comput Appl 23:1381–1386

    Article  Google Scholar 

  2. Pflueger MO, Franke I, Graf M et al (2015) Predicting general criminal recidivism in mentally disordered offenders using a random forest approach. BMC Psychiatry 15:1–10

    Article  Google Scholar 

  3. Tollenaar N, Van Der Heijden PGM (2013) Which method predicts recidivism best?: a comparison of statistical, machine learning and data mining predictive models. J R Stat Soc Ser A Stat Soc 176:565–584

    Article  MathSciNet  Google Scholar 

  4. Ewart BW, Oatley GC (2003) Applying the concept of revictimization: using burglars’ behaviour to predict houses at risk of future victimization. Int J Police Sci Manag 5:69–84

    Article  Google Scholar 

  5. Liu H, Brown DE (2003) Criminal incident prediction using a point-pattern-based density model. Int J Forecast 19:603–622

    Article  Google Scholar 

  6. Corcoran JJ, Wilson ID, Ware JA (2003) Predicting the geo-temporal variations of crime and disorder. Int J Forecast 19:623–634

    Article  Google Scholar 

  7. Harada Y, Shimada T (2006) Examining the impact of the precision of address geocoding on estimated density of crime locations. Comput Geosci 32:1096–1107

    Article  Google Scholar 

  8. Brunsdon C, Corcoran J, Higgs G (2007) Visualising space and time in crime patterns: a comparison of methods. Comput Environ Urban Syst 31:52–75

    Article  Google Scholar 

  9. Enzmann D, Podana Z (2010) Official crime statistics and survey data: comparing trends of youth violence between 2000 and 2006 in cities of the Czech Republic, Germany, Poland, Russia, and Slovenia. Eur J Crim Policy Res 16:191–205

    Article  Google Scholar 

  10. Gnana RD, Punithavalliv M (2012) A study on the existing computer aided crime analysis tools to handle indian state of affairs. Int J Comput Sci Issues 9:528–532

    Google Scholar 

  11. Calhoun CC et al (2008) Improving crime data sharing and analysis tools for a web-based crime analysis toolkit: Webcat 2.2. In: Systems and information engineering design symposium SIEDS 2008, IEEE, pp 40–45

  12. Vural MS, Gök M, Yetgin Z (2013) Generating incident-level artificial data using GIS based crime simulation. In: International conference on IEEE electronics, computer and computation (ICECCO’ 2013). Ankara, pp 239–242

  13. Pitale P, Ambhaikar A (2012) Prediction tool for crime analysis. Int J Comput Technol Appl 3:1040–1042

    Google Scholar 

  14. Vural MS, Gök M, Yetgin Z (2014) Analysis of incident-level crime data using clustering with hybrid metrics. GAU J Appl Soc Sci 6:8–20

    Google Scholar 

  15. Al-Janabi KBS (2011) A proposed framework for analyzing crime data set using decision tree and simple k-means mining algorithms. J Kufa Math Comput 1:8–24

    Google Scholar 

  16. Khan NG, Bhagat VB (2013) Effective data mining approach for crime-terrorpattern detection using clustering algorithm technique. Int J Eng Res Technol 2:2043–2048

    Google Scholar 

  17. Andresen MA (2011) Estimating the probability of local crime clusters: the impact of immediate spatial neighbours. J Crim Justice 39:394–404

    Article  Google Scholar 

  18. Xiang Y, Chau M, Atabakhsh H, Chen H (2005) Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. Decis Support Syst 41:69–83

    Article  Google Scholar 

  19. Austin Police Department Office (2015). http://www.ci.austin.tx.us/police/crime.htm. Accessed 02 Sept 2015

  20. Atlanta Police Department (2015). http://www.atlantapd.org/crimedatadownloads.aspx. Accessed 09 Sept 2015

  21. Sun CC, Yao CL, Li X, Lee K (2014) Detecting crime types using classification algorithms. J Digit Inf Manag 12:321–327

    Google Scholar 

  22. Baumgartner K, Ferrari Palermo G (2008) Constructing Bayesian networks for criminal profiling from limited data. Knowl Based Syst 21:563–572

    Article  Google Scholar 

  23. Andrade M, Ferreira MAM (2009) Bayesian networks in forensic identification problems. Aplimat J Appl Math 2:13–30

    Google Scholar 

  24. Canter D (2009) Developments in geographical offender profiling: commentary on Bayesian journey-to-crime modelling. J Investig Psychol Offender Profil 6:161–166

    Article  Google Scholar 

  25. Poulsen E, Kennedy LW (2004) Using dasymetric mapping for spatially aggregated. J Quant Criminol 20:243–262

    Article  Google Scholar 

  26. Holst A, Bjurling B (2013) A Bayesian parametric statistical anomaly detection method for finding trends and patterns in criminal behaviour. In: Intelligence and security informatics conference (EISIC) 12–14 Aug. 2013. Uppsala Sweden IEEE, pp 83–88

  27. Jain LC, Seera M, Lim CP, Balasubramaniam P (2014) A review of online learning in supervised neural networks. Neural Comput Appl 25:491–509

    Article  Google Scholar 

  28. Corsini P, Lazzerini B, Marcelloni F (2006) Combining supervised and unsupervised learning for data clustering. Neural Comput Appl 15:289–297

    Article  Google Scholar 

  29. Mackenzie MD (1995) CDUL: class directed unsupervised learning. Neural Comput Appl 3:2–16

    Article  Google Scholar 

  30. Harries K (1999) Mapping crime: principles and practice. National Institute of Justice, Washington, DC

    Google Scholar 

  31. Rossmo DK, Laverty I, Moore B (2005) Geographic profiling for serial crime investigation. In: Wang F (ed) Geographic information systems and crime analysis. Idea Group Publishing, Hershey, pp 102–104

    Chapter  Google Scholar 

  32. Toole JL, Eagle N, Plotkin JB (2010) Quantifying behavioral data sets of criminal activity. In: 2010 AAAI spring symposium series; March 22, 2010–March 24, 2010. Palo Alto, California, pp 91–96

  33. Usha D, Rameshkumar KA (2014) Complete survey on application of frequent pattern mining and association rule mining on crime pattern mining. Int J Adv Comput Sci Technol 3:264–275

    Google Scholar 

  34. Upadhyaya D, Jain S (2013) Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification. Int J Comput Sci Issues 10:231–236

    Google Scholar 

  35. Wanawe K, Awasare S, Puri NV (2014) Efficient approach to detecting phishing a web using k-means and Naïve-Bayes algorithms. Int J Res Advent Technol 2:106–111

    Google Scholar 

  36. Sujatha R, Ezhilmaran D (2013) A proposal for analysis of crime based on socio-economic impact using data mining techniques. Int J Soc Appl Comput Sci 2:229–231

    Google Scholar 

  37. Ying W, Peng X, Bian J (2014) Computer crime forensics based on improved decision tree algorithm. J Netw 9:1005–1011

    Google Scholar 

  38. Sharma M (2014) Z-CRIME: a data mining tool for the detection of suspicious criminal activities based on decision tree. In: 2014 International conference on IEEE data mining and intelligent computing (ICDMIC), pp 1–6

  39. Zhen D, Hongxiao F, Wenbiao X (2007) The algorithm of users forensics associate rules mining based on specific pattern tree. Comput Syst Appl 13:56–59

    Google Scholar 

  40. Kaise Q, Xiang-tao C (2009) An improved ID3 algorithm of decision trees. Comput Eng Sci 31:109–111

    Google Scholar 

  41. Gao Y, Liao J, Wu W (2011) ID3 algorithm and C4. 5 algorithm based on decision tree. J Hubei Univ Technol 26:54–56

    Google Scholar 

  42. Nasridinov A, Sun-Young I, Young-Ho P (2013) A decision tree-based classification model for crime prediction. In: Information technology convergence. Springer Netherlands, pp 531–538

  43. Kianmehr K, Reda A (2008) Effectiveness of support vector machine for crime hot-spots prediction. Appl Artif Intell 22:433–458

    Article  Google Scholar 

  44. Bennell C, Mugford R, Ellingwood H, Woodhams J (2014) Linking crimes using behavioural clues: current levels of linking accuracy and strategies for moving forward. J Investig Psychol Offender Profil 11:29–56

    Article  Google Scholar 

  45. Dombroski MJ, Carley KM (2002) Netest: estimating a terrorist network’s structure. Comput Math Org Theory 8:235–241

    Article  Google Scholar 

  46. Saravanan M, Thayyil R, Narayanan S (2013) Enabling real time crime intelligence using mobile GIS and prediction methods. In: 2013 European intelligence and security informatics conference IEEE, pp 125–128

  47. Berchialla P, Francesca F, Dario G (2013) Naïve Bayes classifiers with feature selection to predict hospitalization and complications due to objects swallowing and ingestion among European children. Saf Sci 51:1–5

    Article  Google Scholar 

  48. Lepora N et al (2010) Naive Bayes novelty detection for a moving robot with whiskers. In: 2010 IEEE international conference on robotics and biomimetics (ROBIO). IEEE, pp 131–136

  49. Sandberg R et al (2001) Capturing whole-genome characteristics in short sequences using a naive Bayesian classifier. Genome Res 11:1404–1409

    Article  Google Scholar 

  50. Kenneth M, Stefan W, John M (2001) Knowledge extraction from local function networks. In: International joint conference on artificial intelligence. Lawrence Erlbaum Associates Ltd, pp 765–770

  51. Calvo-Armengol A, Zenou Y (2006) Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int Econ Rev 45:939–958

    Article  MathSciNet  Google Scholar 

  52. Xiao L, Fan M (2014) Does social network always promote entrepreneurial intentions? An empirical study in China. Neural Comput Appl 24:21–26

    Article  Google Scholar 

  53. Porter MD, Brown DE (2007) Detecting local regions of change in high-dimensional criminal or terrorist point processes. Comput Stat Data Anal 51:2753–2768

    Article  MathSciNet  MATH  Google Scholar 

  54. Taheri S, Yearwood J, Mammadov M, Seifollahi S (2014) Attribute weighted Naive Bayes classifier using a local optimization. Neural Comput Appl 24:995–1002

    Article  Google Scholar 

  55. Sagale AD, Kale SG (2014) Combining Naive Bayesian and support vector machine for intrusion detection system. Int J Comput Technol 1:61–65

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehmet Sait Vural.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vural, M.S., Gök, M. Criminal prediction using Naive Bayes theory. Neural Comput & Applic 28, 2581–2592 (2017). https://doi.org/10.1007/s00521-016-2205-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-016-2205-z

Keywords

Navigation