Dutta et al., 2025 - Google Patents
Crime Analysis and Management SystemDutta et al., 2025
- Document ID
- 4824982401081796652
- Author
- Dutta K
- Parui S
- Shaw S
- Biswas S
- Das S
- Publication year
- Publication venue
- SN computer science
External Links
Snippet
In the face of rising crime rates, delays in justice delivery, and fragmented law enforcement processes, there is an urgent need for a unified digital solution that ensures accountability, efficiency, and proactive policing. Traditional systems often lack real-time intelligence …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shafay et al. | Blockchain for deep learning: review and open challenges | |
| Oatley | Themes in data mining, big data, and crime analytics | |
| US20190312869A1 (en) | Data security and protection system using distributed ledgers to store validated data in a knowledge graph | |
| US11025693B2 (en) | Event detection from signal data removing private information | |
| WO2022221037A1 (en) | Predictive response-generation systems to facilitate timely compliance with information-disclosure laws | |
| Nissan | An overview of data mining for combating crime | |
| Yang | Predictive policing in the United States | |
| Montasari | The application of big data predictive analytics and surveillance technologies in the field of policing | |
| Baylon et al. | Securing machine learning algorithms | |
| Rajamäki et al. | How to apply privacy by design in OSINT and big data analytics | |
| Ye et al. | Research on insider threat detection based on personalized federated learning and behavior log analysis | |
| Patel et al. | Convolutional neural network and unmanned aerial vehicle‐based public safety framework for human life protection | |
| Dutta et al. | Crime Analysis and Management System | |
| Amelin et al. | On the legal issues of face processing technologies | |
| Saini et al. | A study of lightweight approaches to analyze crime conditions in India | |
| Machina et al. | Crime analysis and intelligence system model design using Big Data | |
| Solanke | Digital forensics AI: On practicality, optimality, and interpretability of digital evidence mining techniques | |
| Parthasarathy et al. | CSA-Forecaster: Stacked Model for Forecasting Child Sexual Abuse. | |
| Peterson et al. | Finding a Broadly Practical Approach fo r Regulating the Use of Facial Recognition by Law Enforcement | |
| Harris et al. | Behavioural analytics and UK national security | |
| Liu et al. | Financial fraud recognition model based on privacy preserving and federated learning | |
| Gutierrez et al. | The fading gloss of data science: Towards an agenda that faces the challenges of Big Data for development and humanitarian action | |
| Malik et al. | Crime Pattern Analysis: Exploring the Use of ML Algorithms to Identify Patterns in Criminal Behavior, Detect Crime Hotspots, and Support Proactive Law Enforcement Strategies. | |
| Thuraisingham et al. | Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper | |
| Charalambous et al. | A digital decision support system for efficient policing in urban security in a community policing context |