CFP last date
20 December 2024
Reseach Article

Investigating Crimes using Text Mining and Network Analysis

by Nael T. Elyezjy, Alaa M. Elhaless
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 8
Year of Publication: 2015
Authors: Nael T. Elyezjy, Alaa M. Elhaless
10.5120/ijca2015906134

Nael T. Elyezjy, Alaa M. Elhaless . Investigating Crimes using Text Mining and Network Analysis. International Journal of Computer Applications. 126, 8 ( September 2015), 19-25. DOI=10.5120/ijca2015906134

@article{ 10.5120/ijca2015906134,
author = { Nael T. Elyezjy, Alaa M. Elhaless },
title = { Investigating Crimes using Text Mining and Network Analysis },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 8 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number8/22572-2015906134/ },
doi = { 10.5120/ijca2015906134 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:55.676714+05:30
%A Nael T. Elyezjy
%A Alaa M. Elhaless
%T Investigating Crimes using Text Mining and Network Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 8
%P 19-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In these days, security of citizens is considered one of the major concerns of any government in the world. In every country, there is a huge amount of unstructured texts coming from investigating offenders in police departments. As a result, the importance of crime analysis is growing day after day. There is a little research; in methods and techniques that extract criminal networks from unstructured investigations texts especially in Arabic language. In our proposed system, we climb three main distinct contributions to discover forensics using investigation documents. The first by extracting offender names from unstructured text. Secondly, by constructing a crime network from real Arabic investigation documents. Finally, we provide analysis of the interaction between offenders in different documents that directly and indirectly related used to discover a new clue used to solve the crime puzzle. To evaluate the performance and effectiveness of the proposed system, real unstructured documents about investigations are obtained from police departments in the Gaza Strip. The experimental results show that the proposed system is effective in identifying proper offender person's name from real Arabic Documents. The average results for our system using the F-measure is 89% also the average of F-measure in a proposed algorithm for discovery hidden relationship arrive to 92%. In addition; we found that our approach achieves best F-measure results in most cases.

References
  1. M. Alruily, A. Ayesh, and H. Zedan, "Crime type document classification from arabic corpus," in Developments in eSystems Engineering (DESE), 2009 Second International Conference on, 2009, pp. 153-159.
  2. M. Alruily, A. Ayesh, and A. Al-Marghilani, "Using Self Organizing Map to Cluster Arabic Crime Documents," in Computer Science and Information Technology (IMCSIT), Proceedings of the 2010 International Multiconference on, 2010, pp. 357-363.
  3. A. ALKAFF and M. MOHD, "EXTRACTION OF NATIONALITY FROM CRIME NEWS," Journal of Theoretical & Applied Information Technology, vol. 53, 2013.
  4. H. Chen, J. Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, et al., "COPLINK Connect: information and knowledge management for law enforcement," Decision Support Systems, vol. 34, pp. 271-285, 2003.
  5. K. Baumgartner, S. Ferrari, and G. Palermo, "Constructing Bayesian networks for criminal profiling from limited data," Knowledge-Based Systems, vol. 21, pp. 563-572, 2008.
  6. R. Al-Zaidy, B. Fung, A. M. Youssef, and F. Fortin, "Mining criminal networks from unstructured text documents," Digital Investigation, vol. 8, pp. 147-160, 2012.
  7. D. Prakash and S. Surendran, "Detection and Analysis of Hidden Activities in Social Networks," International Journal of Computer Applications, vol. 77, pp. 34-38, 2013.
  8. R. Al-Zaidy, B. C. Fung, A. M. Youssef, and F. Fortin, "Mining criminal networks from unstructured text documents," Digital Investigation, vol. 8, pp. 147-160, 2012.
  9. R. Alfred, L. C. Leong, C. K. On, and P. Anthony, "Malay Named Entity Recognition Based on Rule-Based Approach," International Journal of Machine Learning & Computing, vol. 4, 2014.
  10. H. Cunningham, D. Maynard, K. Bontcheva, V. Tablan, N. Aswani, I. Roberts, et al., "Developing language processing components with gate version 6 (a user guide)," University of Sheffield, UK, Web: http://gate. ac. uk/sale/tao/index.html, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Criminology Text Mining Crime investigation Criminal Networks law enforcement.