GIS based Decision Support System for Crime Mapping, Analysis and identify Hotspot in Ahmedabad City
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 1
Abstract
The rate of crime incidents is increasing in all developing countries due to change of technology and materialistic way of life and also due to poor socio, political, economic and environmental conditions. The distribution of incidents across the landscape is not geographically random since incidents are human phenomena. For incidents to occur, offenders and their targets - the victims and/or property - be required to exist at the same location for a period of time. Several factors, including the lure of potential targets and simple geographic convenience for an offender, influence where people choose to break the law.
Authors and Affiliations
Krunal Patel
ortizontal Aggregation in SQL for Data Mining Analysis to Prepare Data Sets
: Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables and aggregating columns. Existing SQL aggregations have lim...
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Abstract: Present part of the structure of a buildings are found everywhere and is monitored using wireless sensor networks is one of the most emerging technologies for a risk mitigation. Buildings are subjected to...
Energy and Exergy Analysis of Extraction cum Back Pressure Steam Turbine
Abstract: Power is very vital factor for development of any society. Coal shares major chunk of fuels used to produce power in thermal power plants in India. Coal reserves are limited and present coal consumption...
Detecting and Localizing Color Text in Natural Scene Images Using Region Based & Connected Component Method
Abstract: Large amounts of information are embedded in natural scenes which are often required to be automatically recognized and processed. This requires automatic detection, segmentation and recognition of visu...
Securing Personal Information in Data Mining
This paper presents few of the frequent authentication and security mechanisms and mechanisms used in several securing personal information in data mining techniques. The paper describes an overview of some of the well k...