Text Analysis of Smart Cities: A Big Data-based Model
Keywords:
Advanced passenger information, automatic number plate recognition, call detail record, criminal activity, data securityAbstract
Traditional criminal protection approaches rely heavily on the knowledge of legal authorities’ agents. However, it is difficult for them to extrapolate their knowledge to utilize answers in real scenarios. Furthermore, the traditional approaches frequently lose their capacity to avoid problems since they take longer to respond to them. If the crime had occurred, the victims would have already suffered. As a result, it is in the best interests of legal authorities to avoid a crime from happening. We can argue that in order to prevent crime, legal authorities effectively must use data-driven techniques and real-time data analysis. This paper suggests a big data analytics model for analyzing data from various departments. In this study, we proposed using automatic number plate recognition, call detail records, and advanced passenger information data. The proposed model may help to predict potential criminal activities before they occur. Accordingly, this model may allow authorities to stop and prepare for possible criminal activities.
Downloads
References
S. Khan, F. Ansari, H. A. Dhalvelkar, and S. Computer, "Criminal investigation using call data records (CDR) through big data technology," in International Conference on Nascent Technologies in Engineering (ICNTE), Vashi, India. IEEE, 2017, pp. 1-5.
M. Feng et al., "Big data analytics and mining for effective visualization and trends forecasting of crime data," IEEE Access, vol. 7, pp. 106111-106123, 2019.
M. I. Pramanik, R. Y. Lau, W. T. Yue, Y. Ye, and C. Li, "Big data analytics for security and criminal investigations," Wiley interdisciplinary reviews: data mining and knowledge discovery, vol. 7, no. 4, p. e1208, 2017.
S. Kim, P. Joshi, P. S. Kalsi, and P. Taheri, "Crime analysis through machine learning," in 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, Canada. IEEE, 2018, pp. 415-420.
H. Yu and C. Hu, "A police big data analytics platform: Framework and implications," in 1st International Conference on Data Science in Cyberspace (DSC), Changsha, China. IEEE, 2016, pp. 323-328.
Y.-L. Lin, M.-F. Yen, and L.-C. Yu, "Grid-based crime prediction using geographical features," ISPRS International Journal of Geo-Information, vol. 7, no. 8, p. 298, 2018.
C. Amrutha, C. Jyotsna, and J. Amudha, "Deep learning approach for suspicious activity detection from surveillance video," in 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India. IEEE, 2020, pp. 335-339.
Z. Qin, H. Liu, B. Song, M. Alazab, and P. M. Kumar, "Detecting and preventing criminal activities in shopping malls using massive video surveillance based on deep learning models," Annals of Operations Research, pp. 1-18, 2021.
S. Sanober et al., "An enhanced secure deep learning algorithm for fraud detection in wireless communication," Wireless Communications and Mobile Computing, vol. 2021, p. Article ID 6079582, 2021.
M. Jullum, A. Løland, R. B. Huseby, G. Ånonsen, and J. Lorentzen, "Detecting money laundering transactions with machine learning," Journal of Money Laundering Control, vol. 23, no. 1, pp. 173-186, 2020.
O. Sharif, M. M. Hoque, A. Kayes, R. Nowrozy, and I. H. Sarker, "Detecting suspicious texts using machine learning techniques," Applied Sciences, vol. 10, no. 18, p. 6527, 2020.
A. Wibowo and T. Oesman, "The comparative analysis on the accuracy of k-NN, Naive Bayes, and Decision Tree Algorithms in predicting crimes and criminal actions in Sleman Regency," in Journal of Physics: Conference Series, 2020, vol. 1450, no. 1, p. 012076: IOP Publishing.
S. Hossain, A. Abtahee, I. Kashem, M. M. Hoque, and I. H. Sarker, "Crime prediction using spatio-temporal data," in Communications in Computer and Information Science, vol. 1235, N. Chaubey, S. Parikh, and K.
R. Rawat, V. Mahor, S. Chirgaiya, R. N. Shaw, and A. Ghosh, "Analysis of darknet traffic for criminal activities detection using TF-IDF and light gradient boosted machine learning algorithm," in Innovations in Electrical and Electronic Engineering, vol. 756, S. Mekhilef, M. Favorskaya, R. K. Pandey, and R. N. Shaw, Eds.: Springer, Singapore, 2021, pp. 671-681.
R. A. A. Habeeb et al., "Clustering‐based real‐time anomaly detection—A breakthrough in big data technologies," Transactions on Emerging Telecommunications Technologies, vol. 33, no. 8, p. e3647, 2022.
A. Homayounfar, A. T. Ho, N. Zhu, G. Head, and P. Palmer, "Multi-vehicle convoy analysis based on ANPR data," in 4th International Conference on Imaging for Crime Detection and Prevention (ICDP), London, UK. IEEE, 2011.
Y. Sun, X. Zhou, L. Sun, and S. Chen, "Vehicle Activity Analysis Based on ANPR System," in 12th IEEE International Conference on Embedded and Ubiquitous Computing, Milan, Italy. IEEE, 2014, pp. 89-96.
S. Chen, J. Zhu, Q. Xie, W. Huang, and Y. Huang, "Understanding airline passenger behavior through PNR, SOW and webtrends data analysis," in 1st International Conference on Big Data Computing Service and Applications, Redwood City, USA, IEEE, 2015, pp. 323-328.
B. Chaithra, K. Karthik, D. Ramkishore, and R. Sandeep, "Monitoring traffic signal violations using ANPR and GSM," in International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Mysore, India. IEEE, 2017, pp. 341-346.
M. Kumar, M. Hanumanthappa, and T. S. Kumar, "Crime investigation and criminal network analysis using archive call detail records," in 8th International Conference on Advanced Computing (ICoAC), Chennai, India. IEEE, 2017, pp. 46-50.
J. Magnusson and T. Kvernvik, "Subscriber classification within telecom networks utilizing big data technologies and machine learning," in 1st International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, Beijing, China. ACM 2012, pp. 77-84.
J.-C. Tseng et al., "A successful application of big data storage techniques implemented to criminal investigation for telecom," in 15th Asia-Pacific Network Operations and Management Symposium (APNOMS), Hiroshima, Japan. IEEE, 2013, pp. 1-3.
A. Mottini and R. Acuna-Agost, "Relative label encoding for the prediction of airline passenger nationality," in 16th International Conference on Data Mining Workshops (ICDMW), Barcelona, Spain. IEEE, 2016, pp. 671-676.
H. A. Karacabey, "A model of suspected activity detection and application using big data analytics," Ankara Yıldırım Beyazıt Üniversitesi Fen Bilimleri Enstitüsü, 2019.
S. B. Elagib, A.-H. A. Hashim, and R. Olanrewaju, "CDR analysis using big data technology," in International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, Sudan. IEEE, 2015, pp. 467-471.
M. Zhu, C. Liu, J. Wang, X. Wang, and Y. Han, "A service-friendly approach to discover traveling companions based on ANPR data stream," in International Conference on Services Computing (SCC), San Francisco, USA. IEEE, 2016, pp. 171-178.
T. Barker, "American based biker gangs: International organized crime," American Journal of Criminal Justice, vol. 36, no. 3, pp. 207-215, 2011.
A. Fraser, R. Ralphs, and H. Smithson, "European youth gang policy in comparative context," Children & Society, vol. 32, no. 2, pp. 156-165, 2018.
A.E. Topcu, Y.I. Alzoubi, E. Elbasi, E. Camalan, "Social Media Zero-Day Attack Detection Using TensorFlow", Electronics, vol. 12, no. 17, p. 3554, 2023.
Y.I. Alzoubi, A.E. Topcu, A.E. Erkaya, "Machine Learning-Based Text Classification Comparison: Turkish Language Context", Applied Sciences, vol. 13, no. 16, p. 9428, 2023.
N. Shah, N. Bhagat, and M. Shah, "Crime forecasting: A machine learning and computer vision approach to crime prediction and prevention," Visual Computing for Industry, Biomedicine, and Art, vol. 4, no. 1, pp. 1-14, 2021
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.