Volume 2, Issue 1, March 2017, Page: 26-34
A Decision Tree Algorithm Based System for Predicting Crime in the University
Adewale Opeoluwa Ogunde, Department of Computer Science, Redeemer’s University, Ede, Nigeria
Gabriel Opeyemi Ogunleye, Department of Computer Science, Federal University, Oye-Ekiti, Nigeria
Oluwaleke Oreoluwa, Department of Computer Science, Redeemer’s University, Ede, Nigeria
Received: Jan. 27, 2017;       Accepted: Feb. 13, 2017;       Published: Mar. 2, 2017
DOI: 10.11648/j.mlr.20170201.14      View  1204      Downloads  62
CRIME is one of the major problems encountered in any society and universities together with other higher institutions of learning are not exceptions. Thus, there is an urgent need for security agents and agencies to battle and eradicate crime. The Directorate of Students and Services Development (DSSD) are responsible for investigating and detecting criminals of any crime committed within the Redeemer’s University. DSSD faces major challenges when it comes to detecting the real perpetrators of several crimes. An improvement in their strategy can produce positive results and high success rates, which is the basic objective of this project. Several methods have been applied to solve similar problems in the literature but none was tailored to solving the problem in Redeemer’s University and other universities. This work therefore applied classification rule mining method to develop a system for detecting crimes in universities. Past data for both crimes and criminals were collected from DSSD. In order to develop and test the proposed model, the data was pre-processed to get clean and accurate data. The Iterative Dichotomiser 3 (ID3) decision tree algorithm obtained from WEKA mining software was used to analyze and train the data. The model obtained was then used to develop a system that showed the hidden relationships between the crime-related data, in form of decision trees. This result was then used as a knowledge base for the development of the crime prediction system. The developed system could effectively predict a list of possible suspects by simply analyzing data retrieved from the crime scene with already existing data in the database. This system has all the potentials of helping the students’ affairs department and security apparatus of any university and other institutions to quickly detect either the real or possible perpetrators of crimes in the system.
Crime, Classification Rules, Data Mining, Decision Trees, ID3, Prediction, University
To cite this article
Adewale Opeoluwa Ogunde, Gabriel Opeyemi Ogunleye, Oluwaleke Oreoluwa, A Decision Tree Algorithm Based System for Predicting Crime in the University, Machine Learning Research. Vol. 2, No. 1, 2017, pp. 26-34. doi: 10.11648/j.mlr.20170201.14
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Barnadas M. V. (2016), Machine Learning Applied to Crime Prediction, A Degree Thesis submitted to the Faculty of the Escola Tècnica d'Enginyeria de Telecomunicació de Barcelona, Universitat Politècnica de Catalunya.
Berry, M. and Linoff, G. (1997). Data mining techniques: For marketing, sales and support. New York. John Wiley and Sons. Inc.
Cowell, R. G., Dawid, A. P., Lauritzen, S. L. and Spiegelhalter, D. J., (1999). Probabilistic Networks and Expert Systems, Springer-Verlag.
Dilek S., Çakır H. and Aydın M. (2015), Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: a Review, International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 6, No. 1, pp 21-39.
Jenson, F. V. (1996). An Introduction to Bayesian Networks. UCL Press.
Marcus, S., Moy, M. & Coffman, T. (2007), Social Network Analysis, in Diane J. Cook and Lawrence B. Holder, ‘Mining Graph Data’, John Wiley & Sons.
McClendon L. and Meghanathan N. (2015). Using Machine Learning Algorithms to Analyze Crime Data, Machine Learning and Applications: An International Journal (MLAIJ) Vol. 2, No. 1, Pp 1-12.
Megaputer Intelligence, Inc. (2012). Crime Pattern Analysis: Megaputer Case Study. http://www.elon.edu/facstaff/mconklin/cis230/cases/crime_pattern_case.pdf.
Oatley G. C., Ewart B. W and Zeleznikow J., (2004). Decision Support Systems for Police: Lessons from the Application of Data Mining Techniques to ‘Soft’ Forensic Evidence. Expert Systems with Applications.
Pearl, J. (2000). Casualty: Models, Reasoning, and Inference. Cambridge University Press, UK.
Ramasubbareddy, B., Govardhan, A., & Ramamohanreddy, A. (2011). Classification Based on Positive and Negative Association Rules. International Journal of Data Engineering (IJDE) Volume (2) Issue (2), Pp 84.
Seifert, J. (2007). Data Mining: An overview. CRS Report for Congress.
Surjeet Kumar Y., Saurabh P. (2012), “Data Mining Application in Enrollment Management: A Case Study “International Journal of Computer Applications (0975 – 8887), Volume 41–No. 5.
Samrat S. & Vikesh K. (2012) “Classification of Student’s data Using Data Mining Techniques for Training & Placement Department in Technical Education” International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4.
Thearling, K. (2003). Understanding Data Mining: It’s all in the Interaction. Available at www.thearling.com.
Ye, F. (2011). Investigating the effects of sample size, model misspecification, and underreporting in crash data on three commonly used traffic crash severity models. Ph. D. Dissertation. Texas A&M University, UMI Number: 3471262.
Tesfaye, H. (2002). Predictive Modeling Using Data Mining Techniques In Support to Insurance Risk Assessment. Masters Thesis Addis Ababa University, Addis Ababa.
Witten I. H., & Frank E., (2000). Data Mining: Practical Machine Learning Tools and Techniques with Java Implementation. Morgan Kaufmann, October 2000, ISBN 1-55860-552-5.
Browse journals by subject