You are on page 1of 3

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 8050


Yatish Damodare, Vinayak Gaikwad, Rani Kobal
Students of BE(IT),
Under the guidance of Prof. Patil S.S., Prof. Murkute P.N
Al-Ameen College of engineering, Koregaon Bhima, Pune

Cloud computing promises to significantly
change the way we use computers and access and store
our personal and business information with these new
computing and communications, paradigms arise new
data security challenges. The latest technological
developments contributed significantly towards
modernization, at the same time increased the concern
about the security issues. These technologies have
hindered the effective analysis about the criminals. In
many countries the amount of crime incidents that is
reported per day is increasing dramatically.
Concerning about Sri Lanka, The department of Police
is the major organization of preventing crimes. police
departments is to protect the lives and property of
citizens. Any act that causes loss of lives and harms
people is called as crime. Crime analysis, a part of
criminology, is a task that include exploring and
detecting crimes and their relationships with criminals.
Presently there are several crime analysis tools
available in the market. This paper highlights Store
the crime and criminal data on cloud use the platform. The aim of this project to
analyse the crime and criminal data. All existing crime
and criminal information easily available the police
department. Then comparing the previous and present
crime information police department identify the
criminal a s soon as possible. In order to identify most
possible suspect/ suspects for a particular misdeed the
system identifies a pattern of committing the current
crime and then matches it with the patterns of
committing crimes by existing criminals/ suspects.

It is impossible to find a country which has a crimefree society. As long as human beings have feelings
they incline on attempting crimes. So the present
society has also filled with various kinds of crimes.
Conversely the criminals in todays society use various
advanced technologies and commit crimes in a really
tactful ways. So that crime investigation has become a
more complicated process than early days. The
department of Police is the major organization of
preventing crimes in Sri Lanka. It is responsible for
enforcing criminal and traffic law, enhancing public

safety, maintaining order and keeping the peace

throughout the country. Alternatively Crime
investigation has very significant role of police system
in any country. With the increased complexity of crime
investigation process police officers have to bear a lot
of pressure than early days. The most tremendous
threat for the police department in Sri Lanka is
investigating crimes with the current technologies,
because they still use traditional manual processes to
handle crimes that are doing with the use of advanced
According to statistics published by the
department of police in 2010, 57560 cases have
recorded from which 57381 are true cases and 26049
cases are investigation pending. In 2009 total number
of recorded cases are 57340 from which 57182 are true
cases and 28448 cases are investigation pending.
When performing necessary calculations for above
statistics police department has to handle around 157
cases per day. In order to prevent crimes police
officers have to find evidences for those cases and
analyze a large amount of crime related information to
find responsible criminals for each crime incident.
According to above statistics 47.57% cases out of total
true cases are remained as investigation pending. So
the requirement of an efficient way of analyzing crime
related information and identifying criminals of crime
incidents has arisen for providing a superior service to
the society. In responding to this requirement, I have
developed a system named Intelligent analysis Of
Crime Data On Cloud that can potentially identify a
criminal based on the evidences collected from the
crime spot. For providing a better solution I decided to
use Cloud technology in platform. All
the existing crime and criminal database stored in
cloud which is used platform . All the
existing crime and criminal
information easily
available the crime investigators then identify criminal
as soon as possible. In order to identify most possible
suspect/ suspects for a particular misdeed the system
identifies a pattern of committing the current crime
and then matches it with the patterns of committing
crimes by existing criminals/ suspects. More
specifically, we have used a clustering based model to
help in identifying patterns of committing crimes by


International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 8050

each individual and Nave Bayesian Classification has

used to find the most possible suspect/suspects.

To provide computerized cloud storage.
Easy retrieval of crime and criminal
Based on top cloud platform
cloud .
statistics. To provide web based and easy
analysis of data can be easily available using
cloud technology.
Search tool provided to recognize criminals
and crimes.
Police are only liable to access investigation


3.1 System Architecture
IAC can be divided in to several components
in order to describe the system clearly. Fig. 1 shows
those components and how they are interconnected
within the system.
A. User interface
The user interface is one of the most important
parts of any program because it determines how easily
a user can interact with the program. The goal of user
interface design is to make the user's interaction as
simple and efficient as possible, in terms of
accomplishing user goals. As a powerful program with
a poorly designed user interface has very little value,
the process of designing user interface was done very
carefully. User interface, which is one of the
components in ICIS, consists of all the web pages of
the system that are displayed to users through a web
B. Managed bean
Technically, a Managed Bean is a POJO that's
constructed and injected by the JSF framework. It's
commonly referenced by JSF pages. Thus managed
beans are used as model for UI components. They
contain the data and underlying logic of the
application. Managed beans are capable of querying
the system for entities requested by the user interface.
The system encapsulates the requested entity into an
object and returns it to the bean. The bean exposes the
object properties through a set of bean properties. This
architecture simplifies development and shields the
presentation layer from changes to the enterprise
system implementation.

Fig (1) Architecture of IAC

C. Multi agent system
This component is used for analyzing existing
information of criminals on attempting crimes and
identifying a pattern of committing crimes by them.
When user inputs relevant crime information for
finding a possible criminal, the system starts
identifying a pattern of committing that crime based on
the evidences available. The major task that was to be
done when designing this module is the proper
identification of agents and ontology. As I mentioned
earlier five types of agents were identified when
designing the system namely, message space agent,
gateway agent, prisoner agent, criminal agents and
evidence agents. Fig
shows depicts the prime
interactions between each of these agents.
Message Space Agent: responsible for handling
messages over the system. This works as the
communicator between all agents of the system except
Prison agent.
Gateway Agent: acts as a gateway connecting the web
application and underlying multi-agent system.
Prison Agent: check whether the suspect is currently a
prison inmate.
Evidence Agents: responsible for identifying crime
patterns according to the evidences available in a
crime scene and for identifying criminal according to
those patterns.
Criminal Agents: responsible for calculating the
probability of committing a crime. Uses Nave
Bayesian classification:
X = User x committing a crime
Ci = Set of evidences


International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 5, May 2015, ISSN 2348 8050

An Overview and Case Studies.; Artificial

Intelligence Lab, Department of Management
Information Systems, University of Arizona(March
[3] H. Kargupta, K. Liu, and J. Ryan, PrivacySensitive Distributed Data Mining from Multi-Party
Data, Proc. 1st NSF/NIJ Symp. Intelligence and
Security Informatics, LNCS 2665, Springer-Verlag,
2003, pp. 336-342.April 2004.
[4] Grave crime abstract for full year 2010 for whole
island from 01.01.2010 to 31.12.2010, Sri Lanka
police gazette, No 1717, (August 2011).
Fig 3.2: Interaction between Agents
D. Database
Database stores all the crime and criminal
information as well as the patterns or the clusters of
crime incidents. Moreover it stores the details of ICAT
users as well.




[5] Prof. H. N. Renushe, Prof. P. R. Rasal, Prof. A. S.

Desai, Data mining practices for effective
investigation of crime, International Journal of
Computer Applications in Technology, Volume 3,
May 2012, pp. 865-870.
[6] /prod _ac2 .htm.

User Interface:
VisualForce GUI
Hardware Required:
Processor: Dual Core
Memory (RAM): Minimum512 MB RAM
Hard Disk: Minimum 40 GB
Operating System :Minimum Windows XP
Software Required:
Design Tool: StarUML
Development Tool: Eclipse IDE
Development SDK

[8] U.S. Department of Justice;
[9] Abt Associates;

IAC presents a fresh methodology of
identifying a criminal by using existing evidences in
situations where any witness or forensic clues are not
present. IAC also presents a novel methodology of
identifying a criminal, in the absence of witness or any
clue by the forensic experts. Clusters are used to
identify most possible suspect/ suspects for crime

[1] F. Bellifemine, G. Caire, and D. Greenwood,
Developing multi agent systems with JADE, Wiley
series in Agent Technology, 2007, pp. 20-45.
[2] H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G.
Wang, R. Zheng, H. Atabakhsh, Crime Data Mining: