Data mining techniques for detecting the crime hotspot by using GIS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 10
Abstract
A GIS is a computer system capable of capturing, storing, analyzing, and displaying geographically referenced information. GIS works by relating information from different sources. The power of a GIS comes from the ability to relate different information in a spatial context and to reach a conclusion about this relationship. Most of the information we have about our world contains a location reference, placing that information at some point on the globe. . Geographic Information System (GIS) plays an important role in crime mapping and analysis.GIS uses geography and computer-generated maps as an interface for integrating and accessing massive amounts of location-based information. GIS allows police personnel to plan effectively for emergency response, determine mitigation priorities, analyse historical events, and predict future events. GIS can also be used to get critical information to emergency responders upon dispatch or while en route to an incident to assist in tactical planning and response. GIS helps identify potential suspects to increase investigators suspect base when no leads are evident. This paper presents a survey on how GIS is implemented in various crime activities.
Authors and Affiliations
Sangamithra. V , T. Kalaikumaran , Dr. S. Karthik
Agent in Ecommerce Application Based on Cloud Environment
— In this paper secure dealer agent mechanism is implemented to provide market oriented approach by using cloud computing environment. Cloud by leveraging technologies, provides thought on market based resource m...
Improving the efficiency of Monitoring & detecting Intruders in MANET
Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives an...
DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic tec...
Perspective Study on Resource Information Aggregation in Computational Grid
Grid Computing is a mechanism of distributed computing to coordinate and share the networked resources, data domains, storage devices and processing power across geographically distributed locations. In the compu...
Enhancing Route Quality In MANET Using Linear Optimization
Mobile ad-hoc network is a constantly changing wireless network of autonomous nodes which communicate without the aid of any base station by routing the packets through intermediate nodes. As the nodes are mobile...