Vous êtes sur la page 1sur 38

CRIMINALS PATTERN DECIDER

AND THEIR ROUTE PREDICTION

S.LAKSHMI PRIYA
REG NO: 412816621314

UNDER THE GUIDANCE OF


Mr.V.Santhana Marichamy
M.C.A.,M.E.,
ASSISTANT PROFESSOR
ABSTRACT:
 The Intelligent Travel System(ITS) provides an Neural Network based
intelligence system which provides automatic allocation of travel's through
the Global Information system. It is can be implemented in schools,
universities and shopping areas.
 Here is the sequence of instructions to be noted, Once the terrorist caught
by the police,
◦ The crime department will identify the pattern and location of
his travel.
◦ After collecting the travel pattern of the terrorist, the department
will frame the latitude and longitude value of his travel.
◦ This data needs to be feed in to the travel pattern system with the
latitude and longitude values and its co-related with the google
maps.
 Two major components of the ITS are Speed Prediction Neural Network
System (SPNNS) and the Dynamic Traversing Speed Profile (DTSP)
algorithm is based as reference algorithm.
PROBLEM DESCRIPTION:
 The main drawback is there is only a manual intervention of
getting inputs from the terrorists, so no proper inputs will be
received and it may be a fake informations.
 There is no intelligent mining system available in the current
scenarios.
 The existing system holds Policy context, Current Situations,
Services, Measures and Implementation but most of things
are manually maintained.
SYSTEM REQUIREMENTS:
Hardware Requirements
 Processor : Core 2
 RAM : 2-4GB
 HDD : 500 GB

Software Requirements
 Platform : Windows Xp/7/8
 Front End : DOT NET(Visual Studio 2010)

 Back End : SQL sever 2008 R2


SYSTEM STUDY:
EXISTING SYSTEM:
 Existing System focus on the Manual intervention of getting the
inputs from the terrorists.
 No proper inputs received and it may be a fake informations.
 No intelligent mining system available in the current scenarios.
 Most of things are manually maintained and done by the users.
 The existing system holds Policy context, Current Situations,
Services, Measures and Implementation.
PROPOSED SYSTEM:
 This system deals on the mining of the pattern of an
individual is one of an innovative system.
 A comprehensive integration with google maps to provide the
exact pattern of an individual.

 Mining the travel pattern of an individual,


 Visualizing the possible mining pattern,
 Historic mapping of the individual,
 Symbolize the possible attack location,
 Integrate the travel pattern of an individual.
FEASIBILITY STUDY:
Feasibility study is the test of system proposal according to its
workability, impact on the organization, ability to meet user
needs, effective use of resources.
There are three aspects involved in the feasibility study.
 Technical Feasibility
 Economical Feasibility
 Operational Feasibility
TECHNICAL FEASIBILITY:
 This study is carried out to check the technical feasibility,
that is, the technical requirements of the system. Any system
developed must not have a high demand on the available
technical resources. This will lead to high demands being
placed on the client. The developed system must have a
modest requirement, as only minimal or null changes are
required for implementing this system.
ECONOMICAL FEASIBILITY:
 This study is carried out to check the economic impact that
the system will have on the organization. The amount of fund
that the company can pour into the research and development
of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this
was achieved because most of the technologies used are
freely available. Only the customized products had to be
purchased.
OPERATIONAL FEASIBILITY:
 Operational feasibility means whether the new system
performs its work efficiently and asks for the user needs. The
well-planned design would ensure the optimal utilization of
the computer resources and would help in the improvement
of performance status. Here the user only transfer the file so
there is no any complexity to handle this process.
FIND THE
ARCHITECTURE DIAGRAM: PARTICULAR PLACE
(Eg:CHENNAI,BANGALORE,ETC)

CRIME BRANCH TERRORIST


DETAILS AND
COLLECTION ON FIND THE
THE TERRORIST TERRORIST
PATH PATTERN

PREDICTING SOURCE
SERVER AND DESTINATION –
FINDING OF SPECIFIC PLACE
OF ATTACK
UML DIAGRAMS:
USE CASE:
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
ACTIVITY DIAGRAM:
DATAFLOW DIAGRAM:
Level 0:
Finding Criminals-Fields:
Level 1:
Final identification of Attack Fields:
DATABASE DESIGN:
Criminal_details:
Location_details:
Pattern_details:
SYSTEM IMPLEMENTATION:
Module Description:
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
 Terrorists information Feed Module
 Travel Pattern Feed Module
 Attacking Type – Mining Module
 Attacking Location – Mining Module
 Finalized Attacking Pattern Define Module
 Google Maps Integration Module
Terrorists Information Feed Module:

 Thismodule provides an information storage on the terrorists


which is received by the cyber crime team.
◦ The information includes,
 Terrorists name
 Type of Attacks
 Previous Attack History
 Type of Attacking Places
 Any Other information's about the terrorist
 Image of the terrorist.
Travel Pattern Feed Module:
 This module involves the travel pattern history of the user.
 The below information needs to be loaded. It includes the
latitude, longitude, Location, Severity of attack location,
Travel pattern range.
Attacking Type – Mining Module:

 This module provides an analysis of Attacking Type of


Terrorists like some Terrorist will use a bomb, and some will
use a gun for shooting.
 In predictive modeling, data is collected, a statistical model is
formulated, predictions are made and the model is validated
as additional data becomes available.
 The outcome of this module is a fine tuned output of
prediction on Attacking type the user is involved.
Attacking Location-Mining Module:

 This module provides an efficient lookup table for attacking


location of the terrorist.
 Preparation and data preprocessing are the most important
and time consuming parts of this module.
 In this step, the data is converted into an acceptable format
for prediction algorithm. The outcome of this module
provides the attacking location of the terrorists.
Finalized Attacking Pattern Define Module:

 This module provides a consolidated report of the possibility


of attacking location and type of attacks from the previously
mined datasets.
 The finalized output of this project provides a convex nature
of data tune up by narrowing the data to the fine grained
exact data.
 The outcome of this module provides the final identification
of attack of the terrorists.
Google Map Integration Module:

 This module makes to integrate the data and markup a


dynamic Map generation which is integrated with Google
Maps.
 A marker is set to show off, how the navigation is happening
from the Source location to the final location and how the
user travelled and their pattern of travel is identified which is
the final outcome of the project.
SCREENSHOTS:
Mining Travel Pattern:
Adding Criminal Details:
Loaded Message and viewing Criminal
Lists:
Viewing Criminal Activity:
Viewing Travel Plans:
Type of Attack places and Activities:
Mining Attack places and Activities:
Final Prediction:
Google Map Integration:
TEST CASE TABULAR:
TEST TEST CASE ACTUAL EXPECTED OUTCOME
CASE DESCRIPTION RESULT RESULT TEST CASE
ID STATUS

       
T1. Criminal Details As expected Providing Uploaded
correct with successful
required details

   
T2. Criminal Details Not entering Provide all the Enter all the
all the fields required Fields required Fields

         
T3. Criminal Activity As expected Correct successful

         
T4. Attack Place As expected Providing  
correct with successful
required details
CONCLUSION:
 This is used to find out the place of the terrorists and the
possible attacks. Strategies based on new technologies are
raising questions about regulations and the lack of global
frameworks on a range of issues from cybersecurity to privacy
and confidentiality of data.
 This project features includes,
 Identifying the pattern of attacks by the terrorist based on the
previous mined data.
 Identifying the attack pattern through which the terrorist can
attack. This can be retrieved on the previous mined data.
 Integrating with Google maps to identify the real travel
pattern of the terrorists.
 This project provides an innovation in the field of cyber crime
and it really a needy one in the current situation in India.
FUTURE ENHANCEMENT:

 The proposed system finds out efficient result, when


compared with the Existing system.
 In future using the implemented level of that system, is
may used to automatically identified by the system
without providing source details and other information
to find the place of attacks of terrorists.
 
REFERENCES:

 [1] Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “EnablingConferencing


Applications on the Internet Using an OverlayMulticast Architecture,”Proc.
ACM SIGCOMM, pp. 55-67,Aug. 2001.
 [2] Z. Yang, H. Ma, and J. Zhang, “A Dynamic Scalable Service Modelfor SIP-
Based Video Conference,”Proc. Ninth Int’l Conf. ComputerSupported
Cooperative Work in DE,pp. 594-599, May [3] Y. Chu, S.G. Rao, S. Seshan,
and H. Zhang, “Enabling Conferencing Applications on the Internet Using an
Overlay MulticastArchitecture,”Proc. ACM SIGCOMM,pp. 55-67, Aug. 2001.
 [4] O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia
Environment,”Proc. Fourth Int’l Conf. Intelligent Environments,pp. 25-30,
2008.
 [5] E.I. Lin, A.M. Eskicioglu, R.L. Lagendijk, and E.J. Delp, “Advancesin
Digital Video Content Protection,” Proc. IEEE,vol. 93, no. 1,pp. 171-183, Jan.
2005.
 [6] S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung, “ResolvingRightful
Ownerships with Invisible Watermarking Techniques:Limitations, Attacks, and
Implications,”IEEE J. Selected AreasComm.,vol. 16, no. 4, pp. 573-586, May
1998.
 [7] M. Barni and F. Bartolini, “Data Hiding for Fighting Piracy,”IEEESignal
Processing Magazine,vol. 21, no. 2, pp. 28-39, Mar. 2004.
 [8] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility forCollusion-

Vous aimerez peut-être aussi