

Crime Prediction Using Random Forest Model
Abstract
The most serious issue in present scenario is crime, which disrupts the people’s lives. The crime will not occur not only in certain time of human lives but it will occur at any time in person’s life, whether they are travelling home from work or going on trip etc. In terms of public safety, crime prediction is required. We can predict the crimes using Random Forest Model. This model will help the authorized officers do their work efficiently as well as effectively so that they can avoid the crime before it occurs. Depending on the quality of the data, the crime prediction accuracy can vary differently. The amount of crimes that occur can be decreased with effective crime prediction. Models such as Polynomial and Linear Regressions limits in capturing intricacy of crime data , however Regression model demonstrates encouraging results. The main significance that we need to keep in mind is that selecting suitable machine learning methods for tasks related to prediction of crimes.
References
Singh, S., Gole, A., Abhishek, P. R., Kanherkar, P., & Wankhede, P. (2022). Crime prediction using machine learning. IEEE.
Manohar, B., Nikhil, I., Ramakrishna, B., Nagaraj, D., & Vivekananda, S. J. (2024). Crime prediction and analysis using random forest algorithm. IEEE.
Vigneswaran, S., Santhi, R., Sirish, K., & Sridharan, S. (2024). Machine learning-based crime prediction. Amrit Vishwa Vidyapeetham Engineering and Computer Science Department, Chennai, India.
Nasir, Q., Bou Nassif, A., Abu Waraga, O., Abu Talib, M., & Dakalbab, F. (2022). Artificial intelligence and crime prediction: A systematic literature review.
Deepak, N. R., & Balaji, S. (2016). Uplink channel performance and implementation of software for image communication in 4G network. In R. Silhavy, R. Senkerik, Z. Oplatkova, P. Silhavy, & Z. Prokopova (Eds.), Software Engineering Perspectives and Application in Intelligent Systems (Vol. 465, pp. 93–102). Springer.
Pal, R. S., & Deepak, N. R. (2024). Evaluation on mitigating cyber attacks and securing sensitive information with the adaptive secure metaverse guard (ASMG) algorithm using decentralized security. Journal of Computational Analysis and Applications (JoCAAA), 33(2), 656–667.
Rezni, S., & Deepak, N. R. (2024). Challenges and innovations in routing for flying ad hoc networks: A survey of current protocols. Journal of Computational Analysis and Applications (JoCAAA), 33(2), 64–74.
Deepak, N. R., & Balaji, S. (2015). Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5). IEEE.
Deepak, N. R., & Balaji, S. (2015). A review of techniques used in EPS and 4G-LTE in mobility schemes. International Journal of Computer Applications, 109, 30–38.
Deepak, N. R. (2022). A review on fake currency detection using feature extraction. SSRN.
Refbacks
- There are currently no refbacks.