You are on page 1of 42

CRIMINALS PATTERN DECIDER

AND THEIR ROUTE PREDICTION

S.LAKSHMI PRIYA
REG NO: 412816621314

UNDER THE GUIDANCE OF


Mr.V.Santhana Marichamy M.C.A.,
M.E.,
ASSISTANT PROFESSOR
ABSTRACT
 The Intelligent Travel System(ITS) provides an Neural Network based
intelligence system which provides automatic allocation of travel's through
the Global Information system. It is can be implemented in schools,
universities and shopping areas.
 Here is the sequence of instructions to be noted, Once the terrorist caught
by the police,
◦ The crime department will identify the pattern and location of
his travel.
◦ After collecting the travel pattern of the terrorist, the department
will frame the latitude and longitude value of his travel.
◦ This data needs to be feed in to the travel pattern system with the
latitude and longitude values and its co-related with the google
maps.
 Two major components of the ITS are Speed Prediction Neural Network
System (SPNNS) and the Dynamic Traversing Speed Profile (DTSP)
algorithm is based as reference algorithm.
PROBLEM DESCRIPTION
 The main drawback is there is only a manual intervention of
getting inputs from the terrorists, so no proper inputs will be
received and it may be a fake informations.
 There is no intelligent mining system available in the current
scenarios.
 The existing system holds Policy context, Current Situations,
Services, Measures and Implementation but most of things
are manually maintained.
SYSTEM REQUIREMENTS
Hardware Requirements
 Processor : Intel core i3
 RAM : 2-4GB
 HDD : 500 GB

Software Requirements
 Platform : Windows Xp/7/8
 Front End : DOT NET(Visual Studio 2010)

 Back End : SQL sever 2008 R2


SYSTEM STUDY
EXISTING SYSTEM
 Existing System focus on the Manual intervention of getting the
inputs from the terrorists.
 No proper inputs received and it may be a fake informations.
 No intelligent mining system available in the current scenarios.
 Most of things are manually maintained and done by the users.
 The existing system holds Policy context, Current Situations,
Services, Measures and Implementation.
PROPOSED SYSTEM
 This system deals on the mining of the pattern of an
individual is one of an innovative system.
 A comprehensive integration with google maps to provide the
exact pattern of an individual.

 Mining the travel pattern of an individual,


 Visualizing the possible mining pattern,
 Historic mapping of the individual,
 Symbolize the possible attack location,
 Integrate the travel pattern of an individual.
FEASIBILITY STUDY
Feasibility study is the test of system proposal according
to its workability, impact on the organization, ability to
meet user needs, effective use of resources.
There are three aspects involved in the feasibility study.
 Technical Feasibility
 Economical Feasibility
 Operational Feasibility
TECHNICAL FEASIBILITY
 This study is carried out to check the technical
feasibility, that is, the technical requirements of the
system. The .NET allows web development using the
language to function on any windows operating system,
so the software will run on all windows.
ECONOMICAL FEASIBILITY
 This study is carried out to check the economic impact that
the system will have on the organization. All software
necessary for creation of the program is available freely
at no extra cost. This can be obtained for free from a
variety of sources, including the internet, outsourcing
and self-creation, and need extra hardware is required
for the software to perform. No budget is available or
required, so the project is economically feasible.
OPERATIONAL FEASIBILITY
 The operational feasibility represents the systems
performance. It can be supported on platforms like
windows, Linux. It is platform independent. The
resources for the project are obtainable with effort. In
the maintenance will need to be performed as the use
will have been fulfilled.
ORGANIZATION PROFILE
 KAASHIV INFOTECH 
ISO certified Software & Electronics Research Company. The company started at 2010
by J. Venkatesan Prabu. Kaashiv Infotech is currently located at Anna Nagar,
Nungabakkam.
Kaashiv Infotech is a best practices and competencies brought in by leading
professionals on some of the most renowned names of the Corporate World. Over the past
decades, Kaashiv Infotech has provided specialized Knowledge Services to a wide range of
industry verticals.
 SERVICES
Kaashiv Infotech services is Enterprise services, Internet applications, System software,
IT services, Software testing, Networking & Telecom and Customer maintenance support.
 EMPLOYEE
Around 200 Employees are working in the company.
 KAASHIV INFOTECH-VISION
To Provide Extraordinary Customer Satisfaction through,
Hassle-free, multi-market project management expertise.
Adding value at proposal, planning, execution and delivery.
Advanced technology and tools.
FIND THE
ARCHITECTURE DIAGRAM PARTICULAR PLACE
(Eg:CHENNAI,BANGALORE,ETC)

CRIME BRANCH TERRORIST


DETAILS AND
COLLECTION ON FIND THE
THE TERRORIST TERRORIST
PATH PATTERN

PREDICTING SOURCE
SERVER AND DESTINATION –
FINDING OF SPECIFIC PLACE
OF ATTACK
DATAFLOW DIAGRAM
Level 0

Finding Criminals-Fields
Level 1
Final identification of Attack Fields
UML DIAGRAMS
USE CASE
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
DATABASE DESIGN
Criminal_details
Location_details
Pattern_details
SYSTEM IMPLEMENTATION:
Module Description
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
 Terrorists information Feed Module
 Travel Pattern Feed Module
 Attacking Type – Mining Module
 Attacking Location – Mining Module
 Finalized Attacking Pattern Define Module
 Google Maps Integration Module
Terrorists Information Feed Module

 Thismodule provides an information storage on the terrorists


which is received by the cyber crime team.
 The information includes,
 Terrorists name
 Type of Attacks
 Previous Attack History
 Type of Attacking Places
 Any Other information's about the terrorist
 Image of the terrorist.
Travel Pattern Feed Module
 This module involves the travel pattern history of the user.
 The below information needs to be loaded. It includes the
latitude, longitude, Location, Severity of attack location,
Travel pattern range.
Attacking Type – Mining Module

 This module provides an analysis of Attacking Type of


Terrorists like some Terrorist will use a bomb, and some will
use a gun for shooting.
 In predictive modeling, data is collected, a statistical model is
formulated, predictions are made and the model is validated.
 The outcome of this module is a fine tuned output of
prediction on Attacking type the user is involved.
Attacking Location-Mining Module

 This module provides an efficient lookup table for attacking


location of the terrorist.
 Preparation and data preprocessing are the most important
and time consuming parts of this module.
 In this step, the data is converted into an acceptable format
for prediction algorithm. The outcome of this module
provides the attacking location of the terrorists.
Finalized Attacking Pattern Define Module

 This module provides a consolidated report of the possibility


of attacking location and type of attacks from the previously
mined datasets.
 The finalized output of this project provides a convex nature
of data tune up by narrowing the data to the fine grained
exact data.
 The outcome of this module provides the final identification
of attack of the terrorists.
Google Map Integration Module

 This module makes to integrate the data and markup a


dynamic Map generation which is integrated with Google
Maps.
 A marker is set to show off, how the navigation is happening
from the Source location to the final location and how the
user travelled and their pattern of travel is identified which is
the final outcome of the project.
TEST CASE TABULAR
TEST TEST CASE ACTUAL EXPECTED OUTCOME
CASE DESCRIPTION RESULT RESULT TEST CASE
ID STATUS

       
T1. Criminal name As expected Providing Uploaded
correct with successful
required details

   
T2. Criminal name Not entering Provide all the Enter the
criminal name required Fields criminal name

         
T3. Criminal As expected Correct Uploaded
activities successful
     Not entering     
T4. Criminal criminal Providing Enter the
activities activities correct with criminal
required details activities
SCREENSHOTS
Mining Travel Pattern
Adding Criminal Name and Activities-Test Case
Added Criminal Details-Loaded
Message
Viewing Criminal Lists
Viewing Criminal Activity
Viewing Travel Plans
Type of Attack places and Activities
Mining Attack places and Activities
Final Prediction
Google Map Integration
Viewing the Place of Attack
Project Report - Prediction Accuracy
CONCLUSION:
 This is used to find out the place of the terrorists and the
possible attacks. Strategies based on new technologies are
raising questions about regulations and the lack of global
frameworks on a range of issues from cybersecurity to privacy
and confidentiality of data.
 This project features includes,
 Identifying the pattern of attacks by the terrorist based on the
previous mined data.
 Identifying the attack pattern through which the terrorist can
attack. This can be retrieved on the previous mined data.
 Integrating with Google maps to identify the real travel
pattern of the terrorists.
 This project provides an innovation in the field of cyber crime
and it really a needy one in the current situation in India.
FUTURE ENHANCEMENT:

 The proposed system finds out efficient result, when


compared with the Existing system.
 In future using the implemented level of that system, is
may used to automatically identified by the system
without providing source details, as the information
should be get already updated by the crime branch to
find the place of attacks of terrorists.
 
REFERENCES:

 [1] Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “EnablingConferencing


Applications on the Internet Using an OverlayMulticast Architecture,”Proc.
ACM SIGCOMM, pp. 55-67,Aug. 2001.
 [2] Z. Yang, H. Ma, and J. Zhang, “A Dynamic Scalable Service Modelfor
SIP-Based Video Conference,”Proc. Ninth Int’l Conf. ComputerSupported
Cooperative Work in DE,pp. 594-599, May [3] Y. Chu, S.G. Rao, S.
Seshan, and H. Zhang, “Enabling Conferencing Applications on the
Internet Using an Overlay MulticastArchitecture,”Proc. ACM.
 [4] O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia
Environment,”Proc. Fourth Int’l Conf. Intelligent Environments,pp. 25-30,
2008.
 [5] E.I. Lin, A.M. Eskicioglu, R.L. Lagendijk, and E.J. Delp, “Advancesin
Digital Video Content Protection,” Proc. IEEE,vol. 93, no. 1,pp. 171-183,
Jan. 2005.
 [6] S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung, “ResolvingRightful
Ownerships with Invisible Watermarking Techniques:Limitations, Attacks,
and Implications,”IEEE J. Selected AreasComm.,vol. 16, no. 4, pp. 573-
586, May 1998.
 [7] M. Barni and F. Bartolini, “Data Hiding for Fighting
Piracy,”IEEESignal Processing Magazine,vol. 21, no. 2, pp. 28-39, Mar.

You might also like