CRIMINAL MAPPING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL



Similar documents
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL

JOINT IMPORTANCE MEASURES IN NETWORK SYSTEM

An Ensemble Classification Framework to Evolving Data Streams

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS

Development and use of prediction models in Building Acoustics as in EN Introduction. 2 EN 12354, part 1 & Lightweight single elements

s-domain Circuit Analysis

ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( )

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Multi-agent System for Custom Relationship Management with SVMs Tool

ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C.

THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko

A Spam Message Filtering Method: focus on run time

How To Understand Propect Theory And Mean Variance Analysis

Cardiovascular Event Risk Assessment Fusion of Individual Risk Assessment Tools Applied to the Portuguese Population

2) A single-language trained classifier: one. classifier trained on documents written in

Tuition Fee Loan application notes

An Integrated Semantically Correct 2.5D Object Oriented TIN. Andreas Koch

Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm

Statistical Approach for Offline Handwritten Signature Verification

Mathematical model of service quality performance s computing of multiservice network

A Secure Password-Authenticated Key Agreement Using Smart Cards

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

EESE: Nationwide Nanotechnology Ethics Education Development

Prediction of Success or Fail of Students on Different Educational Majors at the End of the High School with Artificial Neural Networks Methods

Lecture #21. MOS Capacitor Structure

Trivial lump sum R5.0

Quantitative Evaluation of Porosity in Aluminum Die Castings by Fractal Analysis of Perimeter

Some Numerical Methods for Temperature and Mass Transfer Simulation on the Dehydration of Herbs

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM

Extending Probabilistic Dynamic Epistemic Logic

Modeling ISP Tier Design

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

The Design of Reliable Trust Management Systems for Electronic Trading Communities

Basic Principle of Buck-Boost

The Shrinking Hand: Why Information Technology Leads to Smaller Firms

Swing-Free Transporting of Two-Dimensional Overhead Crane Using Sliding Mode Fuzzy Control

Netherlands Published online: 27 Jun 2013.

A Novel Architecture Design of Large-Scale Distributed Object Storage System

An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications

Optimum Design of Magnetic Inductive Energy Harvester and its AC-DC Converter

ESSAYS IN RENEWABLE ENERGY AND EMISSIONS TRADING

Mall Cell Network - Power, Memory and Networking

Advances in Military Technology Vol. 10, No. 1, June 2015

Measuring adverse selection in managed health care

Dynamic Control of Data Streaming and Processing in a Virtualized Environment

REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, , 2012.

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.

Pixel Bar Charts: A New Technique for Visualizing Large Multi-Attribute Data Sets without Aggregation

Robust biometric-based user authentication scheme for wireless sensor networks

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

Performance of Multiple TFRC in Heterogeneous Wireless Networks

DEFINING %COMPLETE IN MICROSOFT PROJECT

Predicting Advertiser Bidding Behaviors in Sponsored Search by Rationality Modeling

Capacity-building and training

IT09 - Identity Management Policy

Coordinate System for 3-D Model Used in Robotic End-Effector

2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

An Interest-Oriented Network Evolution Mechanism for Online Communities

Detecting Suspicion Information on the Web Using Crime Data Mining Techniques

Hospital care organisation in Italy: a theoretical assessment of the reform

A FEATURE SELECTION AGENT-BASED IDS

Comparison of workflow software products

The issue of whether the Internet will permanently destroy the news media is currently a

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Using an Adaptive Fuzzy Logic System to Optimise Knowledge Discovery in Proteomics

A Study on Secure Data Storage Strategy in Cloud Computing

Using Content-Based Filtering for Recommendation 1

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

GRADIENT METHODS FOR BINARY INTEGER PROGRAMMING

A Resources Allocation Model for Multi-Project Management

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL , USA

Recurrence. 1 Definitions and main statements

XAC08-6 Professional Project Management

SIMPLIFYING NDA PROGRAMMING WITH PROt SQL

Multi-sensor Data Fusion for Cyber Security Situation Awareness

A DATA MINING APPLICATION IN A STUDENT DATABASE

Simple Interest Loans (Section 5.1) :

On-Line Trajectory Generation: Nonconstant Motion Constraints

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

Transcription:

Voume No. 4 June 202 ISSN 2278-080 The Internatona Journa of Computer Scence & Appcaton TIJCSA RESEARCH AER Avaabe Onne at http://www.journaofcomputercence.com/ CRIMINAL MAING BASED ON FORENSIC EVIDENCES USING GENERALIZED GAUSSIAN MIXTURE MODEL Uttam Mande Y.Srnva J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM Unverty GITAM Unverty J.N.T.Unverty Vakhapatnam Vakhapatnam Kaknada mneuttam@gma.com rteja.y@gma.com mjonnaagedda@gma.com Abtract: The Crme rate and crmna actvte have ncreaed enormouy n the pat few decade. Crme preventon and crmna dentfcaton are the prmary ue before the poce peronne nce property and ve protecton are the bac concern of the poce but to combat the crme the avaabty of poce peronne mted and on the other hand the number of crmna are ncreang dratcay. Hence to upport the aw keeper data about the crmna crmna htory together wth crmna atttude w be very much beneftted. Th paper am toward the contructon of new methodooge baed on Data mnng concept and erve a a decon upport ytem. Gven a et of avaabe cue from the forenc ab and the cue coected at the crme pot a methodoogy preented to map the evdence and dentfy a crmna. Key word: Data mnng Generaed Gauan Mxture mode Crme crmna mappng crmna dentfcaton forenc fnger prnt. Introducton 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 22

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 The ever changng fe tye dere toward uxure envronmenta condton have drven the human toward the crmna actvte [] Many ubc and rvate agence are workng rgorouy to uphod aw and order. Wth the ncreae n the crmna actvte to combat the crme a data bae about the crmna to be mantaned [2]. Coverng the compete nformaton about the crmna and th data houd be made avaabe wth a the poce peron.a the crmna actvte have extended t wng at dfferent ocaton nformaton exchange between the poce taton at dfferent ocaton w be of great advantage [3] Th mechanm houd be hepfu n nformaton harng and thereby hapng toward a meanngfu crme anay. To upport effectve methodooge that hep n crmna nvetgaton for evauatng the phyca cue and determnng the dfferent tratege to be adopted for nvetgaton are to be formuated. Therefore the phyca evdence obtaned from the wtne and the forenc report hep toward the better crmna anay. Hence n th paper a databae generated from the crmna data avaabe from dfferent poce taton of Andhra radeh. The databae created by conderng two bac fact v. avaabty of wtne at the crmna port and the report from the forenc ab that are coected from the cue pot [4]. The data mnng concept are expoted for mnng the kehood of the crmna baed on the feature/ wtne avaabe. Cuterng performng baed on the type of crme. The crme actvte condered n th paper are Murder Rot kdnap and robbery. Baed on the feature decrbed about the crmna a face generated and the generated face compared wth that of the extng face for fndng the kehood of the crmna [6]. Thee dentte are further mapped wth the forenc cue to formuate a unque dentty. Data mnng technque hep to expore the enormou data and makng t pobe n reachng the utmate goa of crmna anay by ung the concept of cuterng and cafcaton. In th paper the concept of cuterng carred out bang on the type of crme. The ret of paper organed a foow ecton -2 of the paper dea wth feature n ecton- 3 deta about the crme dentfcaton preented Cuterng technque dcued n ecton - 4 the Generaed Gauan Mxture mode preented aong wth updated equaton ung EM agorthm expermentaton hghghted n ecton- 5 the ecton 6 of the paper focu on the concuon 2. Acquton of Feature from the wtne: Any crme nvetgaton hghght prmary on two ue Wtne avaabe and 2 Cue avaabe and reatng thee feature wth that of the data avaabe regardng the crmna. The 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 23

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 crme data bae condered n th paper ncude are robbery 2 murder 3 kdnappng 4 rot. For the dentfcaton of any crme we need to have an dea about cue varabe 2 crmna reatng/dentfcaton. Crme cue pay a vta roe n the proper dentfcaton of crmna. The cue hep the teppng tone toward the crme anay and crmna reatng the mappng of the crmna baed on the cue wth data avaabe n the data bae by the ue of ntegent knowedge mappng. 3. Crme Identfcaton ung Crme nk The varou crme nk that were condered ncude Crme ocaton pace: retaurant theater road raway taton hop/god hop ma houe apartment 2 Crmna attrbutehar but eyebrow noe teeth beard age group mutache anguage known 3 Crmna pychoogca behavor can be recogned by type of kng We have condered the type of kng a mooth remova of part harh whch attrbute to the pychoogca behavor of the crmna 4 Modu operand object ued for crme to 2Rope 3Stck 4Knfe Thee crmna nk hep to anaye the dataet there by makng the crme nvetgator to pane for dentfcaton of the crmna. In th paper we have condered bnary cuterng to cuter the data bae baed on type of crme and the cafcaton carred out from the feature avaabe. 3. Bnary cuterng: In order to mpfy the anay proce the huge dataet avaabe to be cutered. The cuterng n th paper baed on the type of crme. A data et generated from the databae avaabe from the Andhra radeh poce department and a tabe created by conderng the FIR report The varou fed condered ncudng the crmna dentfcaton number crmna attrbute crmna pychoogca behavor crme ocaton tme of crme day/nght wtne /cue the data et generated by ung the bnary data of & 0 ndcatng the preence of attrbute 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 24

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 and 0 ndcatng the abence of attrbute then cuterng of the bnary data done a propoed by Tao H 2005 ung the bnary cuterng Crme are categored n many way here we have gven weght to each type of crme where weghng cheme condered n the manner a the reatve crme w be gven wth near vaue after appyng cuterng agorthm on th type of crme feature we have got four cuter of crme data they are robbery kdnap murder and rot Fg categore of crme 4. Generaed Gauan Mxture mode The robabty Denty functon the Generaed Gauan mxture mode gven by f µσ e 2 Γ + A σ Z µ A σ 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 25

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 26 The nta etmate are updated ung the EM agorthm and the fna updated parameter are gven by 2 2 0 3 A σ σ σ Γ > Γ N N t t / 3/ Γ Γ + θ µ θ σ + N N N k t t N γ θ θ µ γ

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 5. Expermentaton The feature are taken a nput from forenc cue and fnger prnt are condered for th purpoe. The fnger prnt avaabe at pot are compared wth that of the databae compared for the reevancy n crmna. we have condered two varant Aumng the fngerprnt are obtaned at the crme pot In order to ratfy a crmna baed on the fnger prnt we have condered the bood group of the crmna f avaabe to map the unquene of the crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna In order to dentfy a crmna baed on the fnger prnt we have ued a Generaed Gauan Mxture Mode The Feature obtaned from the fnger prnt are condered and the robabty Denty Functon cacuated Th DF matched wth that of the extng crmna to dentfy a crmna The man reaon for utng Generaed Gauan Mxture Mode that any fngerprnt may be contanng two type of feature Ø Ø Macro feature Mcro feature Macro feature are thoe feature whch can be dentfed drecty uch a Core and Rdge 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 27

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 In the tuaton where the macro feature are not avaabe mcro feature w be of great ue.mcro feature ncude vaey deta pont whroo crong Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Thee feature are mapped and DF are obtaned the tet equence are compared and the crmna ratfed Fg 2 howng the nput gven to mode Fngerprnt avaabe at crme pot Fnger prnt match wth Crmna fnger prnt 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 28

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 Fg 3 Fg 4 Fg 34 howng the output of Fngerprnt mappng wth crmna databae Fg 5 :the nap hot of data et 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 29

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 When more than one upect gven The mode ue the other cue ke bood or any other cue for further fterng the t of crmna. 6. Concuon: If the wtne not avaabe at the crme ncdent and f the forenc report are avaabe then n uch cae dentfcaton of the crmna a condered n th paper. The crmna fnger prnt are mapped wth that of the avaabe from the data bae. and f there a map the crmna can be dentfed..if the data avaabe from the wtne not uffcent aong wth the forenc report we conder bood ampe and type of kng n order to ratfy crmna. Th paper preent a nove methodoogy of dentfyng a crmna n the preence of cue by the forenc expert. In thee tuaton n th paper we have tred to dentfy the crmna by mappng the crmna ung the Generaed Gauan mxture mode.. Reference:.Care of Berrew Q.C Data mnng: The new weapon n the war on terrorm retrved from the Internet on 28-02-20 2.Cate H. Fred Lega Standard for Data Mnng retreved from the nternet on 2-03-20 http://www.hunton.com/fe/tb_47deta/feupoad265/250/cate_fourth_amendment.pdf 3.Cfton Chrtopher 20. Encycopeda Brtannca: data mnng Retreved from the web on 20-0-20 4.Jeff and Harper Jm Effectve Counterterrorm and the Lmted Roe of redctve Data Mnng retreved from the web 2-02-20 5. U.M. Fayyad and R. Uthuruamy Evovng Data Mnng nto Souton for Inght Comm. ACM Aug. 2002 pp. 28-3. 6. W. Chang et a. An Internatona erpectve on Fghtng Cybercrme roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp. 379-384. 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 30

& Appcaton TIJCSA ISSN 2278-080 Vo. No. 4 June 202 7. H. Kargupta K. Lu and J. Ryan rvacy-sentve Dtrbuted Data Mnng from Mut- arty Data roc. t NSF/NIJ Symp. Integence and Securty Informatc LNCS 2665 Sprnger-Verag 2003 pp. 336-342.Apr 2004 8. M.Chau J.J. Xu and H. Chen Extractng Meanngfu Entte from oce Narratve Report roc.nat Conf. Dgta Government Reearch Dgta Government Reearch Center 2002 pp. 27-275. 9. A. Gray. Sa and S. MacDone Software Forenc: Extendng Authorhp Anay Technqueto Computer rogram roc. 3rd Bannua Conf.Int Aoc. Forenc Lngutc Int Aoc. Forenc Lngutc 997 pp. -8. 0. R.V. Hauck et a. Ung Copnk to Anaye Crmna-Jutce Data Computer Mar. 2002 pp. 30-37.. T. Senator et a. The FnCEN Artfca Integence Sytem: Identfyng otenta Money Launderng from Report of Large Cah Tranacton AI Maganevo.6 no. 4 995 pp. 2-39. 2. W. Lee S.J. Stofo and W. Mok A Data Mnng Framework for Budng Intruon detecton Mode roc. 999 IEEE Symp. Securty and rvacy IEEE CS re 999 pp. 20-32. 0. O. de Ve et a. Mnng E-Ma Content for Author Identfcaton Forenc SIGMOD Record vo. 30 no. 4 200 pp. 55-64. 3. G. Wang H. Chen and H. Atabakhh Automatcay Detectng Deceptve Crmna Identte Comm. ACM Mar. 2004 pp. 70-76. 4. S. Waerman and K. Faut Soca Network Anay:Method and Appcaton Cambrdge Unv. re 994. 202 http://www.journaofcomputercence.com - TIJCSA A Rght Reerved 3