Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

Crime and Insecurity: Towards the Development of an Intelligent System

for a Declining Workforce


 

Wilson Nwankwo1, Wilfred Adigwe2, Pascal U. Chinedu3,


Chukwuemeka Obasi3, Chukwuemeka Pascal Nwankwo1, Duke
Oghorodi2 ,Emmanuel Ojei4,
1
Department of Computer Science, Edo State University, Uzairue, Nigeria
2
Department of Computer Science, Delta State University of Science and Technology, Ozoro, Nigeria
3
Department of Computer Engineering, Edo State University, Uzairue, Nigeria
4
Department of Software Engineering, Delta State University of Science and Technology, Ozoro, Nigeria

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
PRESENTATION OUTLINE 

 Introduction
 Related Works
 Need for an Improved Solution
 Methodology
 Conclusion

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Introduction 

 Nigeria population is estimated at 202 million inhabitants (The World Bank, 2022).

 Nigeria Operates a federal system of Government – 36 states and FCT.

 Nigeria operates a democratic constitution, which is termed “The Grundnorm”


of the countries legal system (Constitution of the Federal Republic of Nigeria, 1999 [as
amended], Section 1(1).).
 The security and welfare of the Nigerian People should be the primary purpose
of the government (Constitution of the Federal Republic of Nigeria, 1999 [as amended], Section
14(2) b.).
 It is on the grounds of the Nigerian peoples’ security and wellbeing than the
Nigerian Police and other related organizations was established.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Introduction (Cont’d) 

 This study focuses of policing, and the Police which is the foremost crime
fighting and Law enforcement agency of the State.

 Law enforcement agencies owe the citizenry the duty to secure lives and
properties (Atilola, et.al. 2018).

 Currently, the Police in Nigeria operates seven functional departments (finance


and planning, operations, logistics and supply, crime investigation, training and
command, research and planning, information and communications), and
fourteen zones. The total human capacity of the entire Police formation is
estimated at 370,000 considered as grossly inadequate when compared to the
United Nations requirement (Bakare, 2021).
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Introduction (Cont’d) 
 The Police Force is regarded in many quarters as endangered species or better
put, a declining workforce with an estimated loss of 9028 service personnel
annually (Vanguard, 2018).
 It is estimated that twenty-nine states in Nigeria receive the sum of $580 million
annually from the federal government for security purposes and particularly for
crime control (Kayakeb, 2018).
 crime increases the precarious nature of an economy, which in turn affects
productivity and Gross Domestic Product (GDP) of a country (Ahmad et.al., 2014).
 Traditional crimes such as kidnapping, armed robbery, burglary, murder, rape,
cult clashes, and a host of technology-driven crimes, have continued to bedevil
most societies irrespective of their global social status. The causes of crime have
been linked to unemployment, poverty, income inequality, hereditary factors,
peer influence (Jonathan et.al, 2021; Metu et.al, 2018).
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Introduction (Cont’d) 

 The less trusted the Police and other security agencies are, the more probable
the citizens would take the law into their own hands (Eze, 2019).
 The poor performances of these agencies have been linked to limited resources
such as personnel and poor technological equipment (Jonathan et.al, 2021).
 To lessen the crime burden in the society, the recruitment of more officers and
the establishment of more crime-fighting agencies may be considered ideal.
 Efficient and effective crime control goes beyond mere recruitment; managing
limited resources is key to effective policing which is attainable if the agencies
understand the society in terms of the typical patterns of crime, that is,
knowledge of which area requires more attention at a specific period (OSAC,
2019).

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Introduction (Cont’d) 
 Knowledge of crime patterns is attainable if data on crime is kept in such a
manner as to afford the analysis and generation of real-time insights when
needed.
 Lately, the problem in many agencies is that majority of the workflows are still
semi-automated and human errors, task complexity, intensive efforts and
resource wastage are commonplace.
 Consequently, modern policing need smart solutions driven by artificial
intelligence and machine learning (Chinedu et.al, 2021).
 Machine learning(ML) has demonstrated immense usefulness in several
socioeconomic sectors in societies (Nwankwo et.al, 2022).
 Consequently, this study is aimed at identifying the critical elements that could
enhance the implementation of a cost-effective, flexible smart system that
would collate, harmonize, store, analyze, segment, profile, visualize, predict
crime occurrences, and apportion resources.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works 
 Mezgebu (2016) has it that Regional Crime Analysis Program(ReCAP) is one of the
earliest innovative products designed by Brown to help the local police in crime
analysis and prevention. It was made up of three main components to wit: geographic
information system (GIS), database, and data mining tools and algorithms. According
to Gammanpila et.al, 2017, ReCAP is laden with technical drawbacks: platform
dependence(Windows 95 and NT operating systems); difficulty and complexity to
use; and Local Area Network (LAN)-dependent.
 Gammanpila et.al, 2017 described a system called COPLINK, an integrated
information and knowledge based environment for managing large amounts of
criminal data. It comprises two parts: the COPLINK connect, and COPLINK detect.
COPLINK connect was for sharing of data from one police department to another
while COPLINK detect was used to discover different crime relationships existing in
police databases. COPLINK is known to exhibit the following drawbacks: difficulty
and complexity in respect of usage; lack of support for visualization and data mining.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works (Contn’d) 
 Thompson & Belur (2016) designed the Self Organizing Map (SOM) which linked
offenders of sexual attacks.
 Han et.al, (2012) discussed a data mining software that permits clients to examine
information, order, sum up the connections distinguished during the mining
procedure.
 Jangra & Kalsi (2019) compared the Naïve Bayes and KNN classifiers and tested it
on sample data sets. They suggested that Naïve Bayes had a better accuracy and less
execution time.
 Omoregbe et.al (2019) designed an E-policing framework to track and control crime
percentage in Nigeria and subsequently presented a structure dependent on innovation
towards alleviating boundaries of manual policing and arrangements of how
distributed computing standards and web innovation could be adjusted to meet the
Nigeria Police Force (NPF) needs.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works (Contn’d) 
 Yuki et.al (2019) designed a model for use in predicting categories of crime most
likely to take place in a location at a designated time. They made use of random forest
classification and decision tree techniques.
 Oguntunde et.al (2018) analyzed a Nigerian crime dataset between 1999 and 2013 to
show relationships that existed.
 ToppyReddy et.al (2018) utilized different machine learning algorithms and
visualization techniques for predicting crime distribution over an area.
 Qayyum (2018) discussed the various crime detection algorithms and pointed out the
strengths and weaknesses of each algorithm.
 Almaw (2018) discussed the Ensemble approach which could be used to carry out
investigation on hidden crime data mining.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works (Contn’d) 
 Ashishakiye et.al (2017) discussed an improved crime prediction model utilizing the
decision tree (J48) algorithm.
 Yandav (2017) utilized managed, semi-supervised and unsupervised strategy on
criminal records for information revelation and to help in expanding the accuracy of
crime prediction.
 Chao & Rifqi (2017) proposed the application of swarm harsh algorithm to brutal
crime wherein three kinds of blend factors: psychological, natural and genetic factors
were identified.
 Saltos (2017) Investigated models for predicting the recurrence of some crimes using
the Lower Layer Super Output Areas – a regulatory arrangement of regions utilized
by the UK police, and the recurrence of hostile to social conduct crimes. Three
calculations were utilized from various classes of approaches: case based learning,
relapse and choice trees.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works (Contn’d) 
 Nash (2016) opined that the issues identified with the acknowledgment of crime could
be evaluated using data mining.
 Shama (2015) proposed k-means clustering for building models against web-based
crime. The proposed model yielded 94.75 % accuracy.
 Oludele et.al (2015) designed and implemented a computerized system targeting the
Nigeria Police Force. They adopted the waterfall model; the Hypertext Mark-up
Language (HTML), PHP and MySQL. The system did not implement any intelligence
for predictions and visualization.
 Shah (2015) developed a desktop application for the Police to digitize First Incident
Report (FIR), staff records and other registers utilized by Police stations.
 Bala (2015) used Geospatial Information System (GIS) as a spatial apparatus to
classify crime zones in Katsina Metropolis, Katsina territory of Nigeria, so as to
generate a crime database for the region.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Related Works (Contn’d) 
 Marteen (2014) utilized Natural Language Processing (NLP) strategies to enable
agents/officers to deal with huge sum of printed data in an increasingly effective and
quicker manner. Its focus was on the execution speed, and ease of use for specialists.
 Ku & Leroy (2014) examined how text analysis and classification procedures could
be utilized to improve e-government, law enforcement officer proficiency and
adequacy.
 Zuby & Mahmud (2014) proposed a model for crime analysis utilizing the k-means
algorithm. They suggested that the paper could be of assistance in finding examples
and patterns, making gauges, discovering connections and potential clarifications,
mapping criminal systems and in identifying potential suspects.
 Andresen et.al (2014) examined crime relocation by recognizing changes in the
spatial examples/ dissemination of crime.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
The Need for an Improved Solution 
 From different studies considered above, it is obvious that remarkable
accomplishments have been recorded in research on crime management and the
construction of models aimed at developing intelligent systems for crime
management. However,
 Majority of the solutions are either discontinued due to their inflexibility, complexity,
platform-dependence, or their existence as models alone.
 Theoretical models are hard to use by law enforcement agencies. These agencies need
cost-effective products that are available on almost any platforms for flexibility.
 Providing a platform with an embedded reliable algorithm like Naive Bayes and the
capability to accommodate hybrid machine learning algorithms is considered a
beneficial approach towards attaining the effectiveness and efficiency in crime
management, crime pattern identification and analysis etc.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
The Need for an Improved Solution (Cont’d) 
Unlike some of the existing systems, we propose a system that would be location-
independent, platform-independent, provide intelligence, and visualization tools to help
agencies with rapid intelligent decision making and taking thereby boosting the
productivity of the available manpower. The system would be web based made
accessible to citizens thereby promoting the principle of collective participation in the
fight against crime.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Methodology 
 The proposed methodology is the object-oriented methodology(OOM) as it affords
the decomposition and recomposition of any system irrespective of their complexity
(Nwankwo, 2016).
 the OOM is an advanced methodology that could be used to develop any software
solution whether intelligent or traditional procedure-oriented systems.
 The tools used are: Microsoft Visual Studio, Apache Spark, Apache Web Server.
MySQL Server 8.0, Jetbrains IntelliJ IDEA Ultimate.
 The process starts with data collection, and the major source of data was the State
Criminal Investigation Department(SCID), Panti, Yaba, Lagos State, and the Lagos
State Police command situated in Ikeja GRA respectively.
 The datasets were obtained from the Force Statistics and Records Unit of the
Department of Research and Development. Following the data collection phase, the
existing system were analysed using object-oriented tools such as the use case
diagrams and activity diagrams.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
The crime reporting process (Analysis of the Existing System) 
 The actors involved in reporting a criminal event include the victim(s), eyewitnesses,
the officer(s) who might have witnessed the crime, and the public relations office. A
crime may be reported through the First Incident Report (FIR). There are various
scenarios during this process which are identified as follows:
 Victim / Eyewitness(s) calls helplines to report criminal activity after it has occurred.
 Victim / Eyewitness(s) goes to station to report criminal activity and files report on
first arrival.
 Patrol officers get to crime scene and if possible arrest suspect and if possible take
eyewitness(s) and victims to station to file report.
 The case is then classified as valid or not depending on the officer’s report.

Fig. 1-2 below show the use case and activity diagrams respectively for the existing
crime reporting process
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig. 1: Use case diagram of the crime reporting subsystem
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig. 2: Activity diagram of the crime reporting subsystem
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
The crime data management process (Analysis of the Existing System) 
 Three main actors identified in this subsystem are: records officers, criminal
investigative department (CID), and the investigators. the activities undertaken during
this phase are shown in Fig. 3-4 below.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig. 3. Use case diagram for the existing crime data management subsystem.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig. 4. Activity diagram of the crime data management subsystem.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Identified Issues in the Existing System 
 A colossal volume of information exists in physical structure which make
recovery much troublesome and for all intents and purposes incomprehensible;
particularly when it has to do with recovery and study of a huge amount of
records.
 The existing system doesn't oblige information from all subsystems for
straightforward recovery and control thus data extraction and study is largely
irksome.
 Paper work constitutes more than 70% of the crime management workflow and
paper files could be stolen or damaged leading to loss of sensitive information.
 Precious time could be wasted in trying to transmit information from one
department to another and also when assigning cases to an investigative officer.
 Intelligent decision making and crime pattern identification is a difficult task.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Crime reporting subsystem (Analysis of the Proposed System) 
 In the proposed system the actors involved in the crime reporting subsystem,
would include:
 the records officer,
 officers and victim(s) / eyewitness(s).

The victim / eyewitness could call the helpline and report a case or go to the station
to record a First Incident Report (FIR). Fig. 5 shows the use case diagram of the
proposed crime reporting system.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig.5. Use case diagram of the proposed crime reporting subsystem
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Figure 6 shows the various use cases that represents the activities carried out in the
proposed crime data management subsystem.

Fig. 6. Use case diagram of the proposed crime data management subsystem

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig.7 shows the various use cases that represents the activities carried out in the
proposed system for Crime Analysis and Prediction.

Fig.7. Use case diagram for the crime analysis and prediction subsystem
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig. 8 represents the workflow in the crime reporting subsystem, and Fig. 9 shows the
activity diagram for the crime data management subsystem

Fig. 8.Activity diagram of the proposed crime reporting subsystem


ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Fig.9.Activity diagram for the crime data management subsystem
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Crime Dataset and Attributes
The dataset provides information on crime incidents that occurred in Lagos State
from 2015 to 2019. It was collected in spreadsheet and converted into a csv format.
The attributes of the data are presented in Table 1. Table 2 shows the sample dataset
from the various area commands. Each area represents a cluster of police stations
under a given commander or jurisdiction within the State. The areas are identified
formally as Areas A-N.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Table 1. Crime dataset attributes

Attribute Description

Year Year crime event took place.

Crime category Type of crimes. This is the target label for the data. There are 40 types of crime listed in
the data.

Area Command Name of police commands. There were a total 13 Police Area Commands in the data.

Case reported Number of cases reported from citizens through FIR reports.

Case refused Number of cases classified as false alarm.

True case Number of cases classified as true.

Persons arrested or summoned Number of persons arrested or summoned for questioning and interrogations.

Gender Gender status of accused.

Age group Group specifying if accused is an adult, youth or underage.

Killed Number of victims killed during course of criminal event.

G.B.H Number of victims injured during course of criminal event.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Table 2. Sample of the processed dataset for area commands
Crime categories Area_A Area_B Area_C Area_D Area_E Area_F Area_G Area_H Area_J Area_K Area_L AreaM Area_N

Murder 8 4 7 15 7 5 1 0 0 0 0 4 8
Manslaughter 0 1 0 0 0 0 0 0 0 0 0 0 0
Attempted_Murder 1 1 1 4 2 1 0 0 0 0 0 1 1
Suicide 3 3 5 9 4 1 1 0 0 0 0 2 3
Attempted_Suicide 1 2 3 7 0 2 1 1 0 0 0 2 1
Grievious_Harm_and_Wounding 240 114 97 166 140 80 40 50 30 45 35 190 240

Assaults 240 165 176 360 210 220 72 160 21 34 23 310 240
Child_Stealing 2 3 3 16 210 2 2 0 0 0 0 4 2
Slave_Dealing 1 2 3 5 2 1 2 0 0 0 0 2 1
Rape_and_Indecent Assault 10 9 8 27 20 10 3 4 1 2 0 10 10

Kidnapping 6 1 2 1 1 1 1 1 0 1 0 1 6
Unnatural_Offences 5 4 7 14 6 0 0 0 0 0 0 5 5
Armed_Robbery 8 7 7 28 10 8 5 5 1 3 0 10 8
Demanding_With_Menace 1 1 2 5 2 1 0 0 0 0 0 2 1

Theft_And_Other_Stealing 5 200 212 490 345 270 135 120 50 130 60 470 5

Burglary 10 25 37 45 76 20 10 10 4 10 6 50 10
House_Breaking 12 10 16 30 39 8 7 8 2 5 3 25 12
Store Breaking 2 11 14 35 15 0 4 5 1 2 0 6 2
False_Pretences_Cheating 48 90 90 337 240 98 40 40 20 40 20 140 48

Forgery 3 6 6 39 12 8 3 4 1 2 0 7 3
Receiving_Stolen_Property 2 4 6 22 10 3 3 3 0 0 0 2 2

Unlawful_Possesion 20 18 17 47 45 10 15 15 5 15 10 40 20
Arson 2 2 7 8 5 0 2 1 1 1 0 3 2
Forgery_Of_Currency_Notes 1 2 2 4 2 2 0 0 0 0 0 2 1

Coining_Offences 0 1 0 1 1 0 0 0 0 0 0 0 0
Gambling 30 56 54 150 110 30 20 30 5 15 10 60 30
Breach_of_Public_Peace 120 130 115 271 280 120 80 100 30 60 30 200 120

Prejury 0 2 1 2 1 0 0 0 0 0 0 0 0
Bribery_and_Corruption 0 0 0 0 0 0 0 0 0 0 0 0 0

Escape_From_Lawful_Custody 0 2 3 6 3 0 0 2 0 0 0 3 0

Offences_Against_Traffic Acts 3 10 10 18 7 2 2 2 1 0 0 5 3

Offences_Against_Township_Acts 0 0 0 0 0 0 0 0 0 0 0 0 0

Offences_Against_Liquor_Acts 0 0 0 0 0 0 0 0 0 0 0 0 0

Offences_Against_Dog_Acts 0 0 0 0 0 1 0 0 0 0 0 0 0

Offences_Against_Fire_Arm_Acts 0 0 0 1 0 0 0 0 0 0 0 0 0

Narcotics 0 0 0 0 0 0 0 0 0 0 0 0 0

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Feature Engineering
 Data preprocessing includes changing the crude data into useful structures. Crude
datasets are sporadically described by irregularities, and patterns containing
blunders.
 It was necessary to deal with these missing values and address irregularities.
Therefore, preprocessing was carried out to avoid out of range values, and
unrealistic data combinations.
 Missing values and redundancies were also handled during this stage. The interest
is on the most important attributes that influences the predicted variable crime
category. Since crime data comprises of string labeled data, we utilize a string
indexer, a feature transformation technique provided by Apache Spark.
 After the dataset is indexed, it would be normalized by scaling in a way with the
end goal that qualities fall within a range between 0.0 to 1.0. The normalization
would be done with standard deviation and the mean.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
 For standardization we would utilize Apache Standard Scaler class. Table 3 shows
the selected features used for prediction.
Table 3. Selected Features of Dataset
Attribute Description

Area Commands Name of police commands.

Offences Against Person Category 1 of crime

Offences Against Properties Category 2 of crime

Offences Against Law Act Category 3 of crime

Grand Total Frequency of the crime committed in the area

Adults Frequency of Adults offenders

Under-aged Frequency of Under-aged Offenders

Gradation of Havoc caused Measure of havoc done to area.

No of victims Number of victims injured during course of criminal event.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Prediction Model
 Next, a model for prediction is constructed.
 We intend to use the Apache Spark machine learning library.
 This tool provides a rich facility to easily work with big data along with machine
learning and data mining capabilities.
 Because the memory utilization is managed well in Apache Spark, we do not need
be concerned with tasks like memory allocation or processing power.
 The Naïve Bayes would be utilized to predict crime categories.
 This classifier is executed by applying the Bayesian Hypothesis:
According to the theorem: ….. (1)
Where:
P (A|B) = conditional probability of A given B.
P (B|A) = conditional probability of B given A.
P (A) = probability of event A.
P (B) = probability of event B.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Predictive Investigation Strategies

 We proposed predictive investigation strategies for anticipating the most likely


category of a crime that would occur at some place.
 To integrate the predictive system into the entire application, a machine learning
module would be built. Since Apache Spark alongside its Machine Learning Library
R gives a rich toolset to AI and data mining strategies, utilizing it would be an ideal
decision.
 We have actualized the Machine Learning segment which is based on the Apache
Spark MlLib and made in a manner to conceal the multifaceted and complex nature
of spark machine learning calculations.
 Since crime data has a parcel of printed information it creates enormous
irregularities, and blunders when feeding it into the machine learning module.

ICCSEEA2023: The 6th International Conference on


Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Architecture of the Proposed System
Fig.10 is the component model diagram for the proposed crime analysis and
prediction solution

Fig. 10. Component model diagram of the proposed system


Conclusion
 Crime management, control, and projection constitute a major workflow in the quest for
better crime fighting operations aimed at containing the plethora of hybrid crimes in
recent times.
 It has been shown that ICT plays important roles in the various circles of crime
prevention and contro (Olawale et.al, 2022; Nwankwo et.al, 2018; Yudi et.al, 2015 etc.).
 This study is an attempt to develop a functional flexible multi-channel system using real
data on crime. The essence is to apply advanced technologies to provide effective and
efficient solution for a grossly inadequate policing system that is completely
overwhelmed by a large population and rising crime rate.
 This study is part of an ongoing project which is expected to present the Nigeria Police
with a sophisticated tool. In this study we have detailed the procedures followed to
collect requisite data on crime over a period from one of Africa’s busiest criminal
investigation departments located in Lagos Nigeria.
ICCSEEA2023: The 6th International Conference on
Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
Conclusion (Cont’d)
 We conducted a detailed review on the available technologies as well as concluded
studies on technology-enhanced policing and crime fighting. Our intention is to integrate
enormous prediction and visualization abilities into a user-friendly front-end.
 We presented the analysis specifications using use case and activity diagrams. We also
specified the interesting features in the dataset that would constitute the prediction
parameters.
 The proposed architecture of the system is presented but the overall interface and
database specifications had been left out for convenience.
 From what have been realized so far we conclude that the development of an intelligent
system for efficient policing and crime control is feasible and when completed would
boost the policing operations in Nigeria and other sub-saharan countries.
 The complete design specifications, test cases, and system evaluation results from
specific policing agencies will be presented in a future paper.
ICCSEEA2023: The 6th International Conference
on Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.
THANK YOU!

ICCSEEA2023: The 6th International Conference


on Computer Science, Engineering and Education
Applications
March 17 – March 19, 2023, Warsaw, Poland.

You might also like