SlideShare a Scribd company logo
1 of 2
Download to read offline
Crime Data Analyis Using Data Mining for Crime
Prediction
Anavadya Shibu; Anish S. A.; Gokul Krishnan S.;Vijayalekshmi V. R.
S8 Computer Science and Engineering
Mohandas College of Engineering and Technology
Anad, Nedumangad, Thiruvananthapuram -695544
Mrs. Prathibha S. Nair,
Assistant Professor, Department of Computer Science and Engineering,
Mohandas College of Engineering and Technology
Anad, Nedumangad, Thiruvananthapuram -695544
Abstract— This project presents a general idea about the
model of Data Mining techniques and diverse crimes. It also
provides an inclusive survey of competent and valuable
techniques on data mining for crime data analysis. The
objective of the data mining is to recognize patterns in
criminal manners in order to predict crime anticipate
criminal activity and prevent it. This project implements a
novel data mining techniques like KNN, Text Clustering, IR
tree for investigating the crime data sets and sorts out the
accessible problems. The collective knowledge of various
data mining algorithms tend certainly to afford an
enhanced, incorporated, and precise result over the crime
prediction in the banking sectors Our law enforcement
organizations require to be adequately outfitted to defeat
and prevent the crime. This project is developed using Java
as front-end and MySQL as back-end. Supporting
applications like Sunset, NetBeans are used to make the
portal more interactive.
Keywords-component; formatting; style; styling; insert
(key words)
I. INTRODUCTION
Data Mining or Knowledge Discovery in Databases (KDD
in simple words is nontrivial extraction of implicit,
previously unknown, and potentially useful information
from data [1],[2],[3]. It deals with the discovery of hidden
knowledge, unexpected patterns and new rules from large
databases. KDD is the process of indentifying a valid,
potentially, useful and ultimately understandable structure
in data. Data mining represents of the emerging field that
can be used a wide disciplinary of applications including
marketing, banking, airlines and many other fields that
highly affect the communities. Crime analyzes is one of
these important applications of data mining. Data mining
contains many tasks and techniques including
Classification, Association, Clustering, Prediction each of
them has its own importance and applications [1],[2],[ 3].
Advances in technology, which allow analyzes of large
quantities of data, are the foundation for the for relatively
new field known as crime analyze. Crime analyzes is an
emerging field in law enforcement without standard
definitions. This makes it difficult to determine the crime
analyzes focus for agencies that are new to the field. In
some police departments, what is called “crime analysis”
consist of mapping crimes for command staff and
producing crime statistics. In other agencies, crime analysis
might mean focusing on analyzing various police reports
and suspect information to help investigators in major crime
units. Crime analysis is proceeding of analyzing crime.
More specifically, crime analysis is the breaking up of acts
committed in violation of laws into their parts to find out
their nature and reporting, some analysis [4]. The role of the
crime analysts varies from agency to agency. Statement of
these findings is the objective of most crime analysis to find
meaningful information in vast amounts of data and
disseminate this information to officers and investigators in
the field to assist in their efforts to apprehend criminals and
suppress criminal activity. Assessing crime through
analysis also helps in crime prevention efforts [4],[7],[10].
II. PROBLEM STATEMENT
We propose to implement a model that could help us to extract
crime patterns. These patterns will be applied to some data
mining algorithms such as association rules mining and
clustering to classify crime records on the basis of the values
of attributes crime. Applying such algorithms will illustrate the
overall results of using both algorithms to perform better
results rather in association rule mining or in clustering. The
scenarios generated by the system could be easily presented in
human language which might be used by Law Enforcement
officers to help them decided a crime prevention strategy.
III. PROBLEM SOLUTION
Law enforcement agencies today are faced a large volume of
data that must be preprocessed and transformed into useful
information. Data mining can improve crime analysis and aid
in reducing and preventing crime. The purpose of this study to
explore the applicability of data mining techniques in the
efforts of crime analysis and prevention. The data was
collected manually. Our proposed model will be able to extract
crime patterns by using clustering to classify crime records on
the basis of the values of crime attributes.
Cluster analysis: Grouping a set of data objects into
clusters. Clustering is unsupervised classification: no
predefined Classes. Simple K-Means clustering algorithm is
used in this paper. K-Means algorithm clusters the data
members groups were m is predefined. Input-Crime type,
Number of clusters, Number of Iteration Initial seeds might
produce an important role in the final results.
Step 1: Randomly Choose cluster centers.
Step 2: Assign instance to cluster based on
their distance to the cluster centers.
Step 3: Centers of clusters are adjusted.
Step 4: go to Step 1 until convergence.
Step 5: Output X0,X1,X2,X3.
Output
Table 2: Confusion Matrix
All of these values are derived from information provided
from the truth table, also known as a confusion matrix,
provides the actual and predicted classifications from the
predictor.
TPR= a/a+b………………..(2)
FPR = b/b+d……………….(3)
Accuracy= a+d/a+b+c+d…..(4)
Precision= a/a+b…………...(5)
The mean idea is to define k centers, one for each cluster.
These centers should be placed in a cunning way because of
Different location causes different result. So, the better choice
is to place them as much as possible far away from each other.
The next step is to take each point belonging to a given data
set and associate it to the nearest center. the first step is
completed and an early group age is done. At this point we
need to re-calculate k new centroids as barycenter of the
clusters resulting from the previous step. After we have these k
new centroids, a new binding has to be done between the same
data set points and the nearest new center. A loop has been
generated. As a result of this loop we may notice that the k
centers change their location step by step until no more
changes are done or in other words centers do not move any
more. Finally, this algorithm aims at minimizing an
objective function know as squared error function given by:
J(v)= ( )2 1 1 xi vj c i ci j −∑∑ = = (1)…..(6)
Whereas,
‘||xi - vj||’ is the Euclidean distance between xi and vj
‘ci’ is the number of data points in ith cluster. ‘c’ is the
number of cluster centers.
The K-Mean algorithm is fast, robust and easier to
understand. and gives best results when data set are distinct or
well separated from each other.
IV. CONCLUSION
An acceptable model for data mining which comes up with
excellent results of analyzing crime data set; it requires huge
historical data that can be used for creating and testing the
model.

More Related Content

What's hot

What's hot (20)

Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Multimedia (Social Forensics)
Multimedia (Social Forensics)Multimedia (Social Forensics)
Multimedia (Social Forensics)
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Similar to Crime Data Analysis, Visualization and Prediction using Data Mining

Similar to Crime Data Analysis, Visualization and Prediction using Data Mining (20)

A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.doc
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysis
 
Survey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data AnalysisSurvey of Data Mining Techniques on Crime Data Analysis
Survey of Data Mining Techniques on Crime Data Analysis
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
 
Bs4301396400
Bs4301396400Bs4301396400
Bs4301396400
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Recently uploaded (20)

BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 

Crime Data Analysis, Visualization and Prediction using Data Mining

  • 1. Crime Data Analyis Using Data Mining for Crime Prediction Anavadya Shibu; Anish S. A.; Gokul Krishnan S.;Vijayalekshmi V. R. S8 Computer Science and Engineering Mohandas College of Engineering and Technology Anad, Nedumangad, Thiruvananthapuram -695544 Mrs. Prathibha S. Nair, Assistant Professor, Department of Computer Science and Engineering, Mohandas College of Engineering and Technology Anad, Nedumangad, Thiruvananthapuram -695544 Abstract— This project presents a general idea about the model of Data Mining techniques and diverse crimes. It also provides an inclusive survey of competent and valuable techniques on data mining for crime data analysis. The objective of the data mining is to recognize patterns in criminal manners in order to predict crime anticipate criminal activity and prevent it. This project implements a novel data mining techniques like KNN, Text Clustering, IR tree for investigating the crime data sets and sorts out the accessible problems. The collective knowledge of various data mining algorithms tend certainly to afford an enhanced, incorporated, and precise result over the crime prediction in the banking sectors Our law enforcement organizations require to be adequately outfitted to defeat and prevent the crime. This project is developed using Java as front-end and MySQL as back-end. Supporting applications like Sunset, NetBeans are used to make the portal more interactive. Keywords-component; formatting; style; styling; insert (key words) I. INTRODUCTION Data Mining or Knowledge Discovery in Databases (KDD in simple words is nontrivial extraction of implicit, previously unknown, and potentially useful information from data [1],[2],[3]. It deals with the discovery of hidden knowledge, unexpected patterns and new rules from large databases. KDD is the process of indentifying a valid, potentially, useful and ultimately understandable structure in data. Data mining represents of the emerging field that can be used a wide disciplinary of applications including marketing, banking, airlines and many other fields that highly affect the communities. Crime analyzes is one of these important applications of data mining. Data mining contains many tasks and techniques including Classification, Association, Clustering, Prediction each of them has its own importance and applications [1],[2],[ 3]. Advances in technology, which allow analyzes of large quantities of data, are the foundation for the for relatively new field known as crime analyze. Crime analyzes is an emerging field in law enforcement without standard definitions. This makes it difficult to determine the crime analyzes focus for agencies that are new to the field. In some police departments, what is called “crime analysis” consist of mapping crimes for command staff and producing crime statistics. In other agencies, crime analysis might mean focusing on analyzing various police reports and suspect information to help investigators in major crime units. Crime analysis is proceeding of analyzing crime. More specifically, crime analysis is the breaking up of acts committed in violation of laws into their parts to find out their nature and reporting, some analysis [4]. The role of the crime analysts varies from agency to agency. Statement of these findings is the objective of most crime analysis to find meaningful information in vast amounts of data and disseminate this information to officers and investigators in the field to assist in their efforts to apprehend criminals and suppress criminal activity. Assessing crime through analysis also helps in crime prevention efforts [4],[7],[10]. II. PROBLEM STATEMENT We propose to implement a model that could help us to extract crime patterns. These patterns will be applied to some data mining algorithms such as association rules mining and clustering to classify crime records on the basis of the values of attributes crime. Applying such algorithms will illustrate the overall results of using both algorithms to perform better results rather in association rule mining or in clustering. The
  • 2. scenarios generated by the system could be easily presented in human language which might be used by Law Enforcement officers to help them decided a crime prevention strategy. III. PROBLEM SOLUTION Law enforcement agencies today are faced a large volume of data that must be preprocessed and transformed into useful information. Data mining can improve crime analysis and aid in reducing and preventing crime. The purpose of this study to explore the applicability of data mining techniques in the efforts of crime analysis and prevention. The data was collected manually. Our proposed model will be able to extract crime patterns by using clustering to classify crime records on the basis of the values of crime attributes. Cluster analysis: Grouping a set of data objects into clusters. Clustering is unsupervised classification: no predefined Classes. Simple K-Means clustering algorithm is used in this paper. K-Means algorithm clusters the data members groups were m is predefined. Input-Crime type, Number of clusters, Number of Iteration Initial seeds might produce an important role in the final results. Step 1: Randomly Choose cluster centers. Step 2: Assign instance to cluster based on their distance to the cluster centers. Step 3: Centers of clusters are adjusted. Step 4: go to Step 1 until convergence. Step 5: Output X0,X1,X2,X3. Output Table 2: Confusion Matrix All of these values are derived from information provided from the truth table, also known as a confusion matrix, provides the actual and predicted classifications from the predictor. TPR= a/a+b………………..(2) FPR = b/b+d……………….(3) Accuracy= a+d/a+b+c+d…..(4) Precision= a/a+b…………...(5) The mean idea is to define k centers, one for each cluster. These centers should be placed in a cunning way because of Different location causes different result. So, the better choice is to place them as much as possible far away from each other. The next step is to take each point belonging to a given data set and associate it to the nearest center. the first step is completed and an early group age is done. At this point we need to re-calculate k new centroids as barycenter of the clusters resulting from the previous step. After we have these k new centroids, a new binding has to be done between the same data set points and the nearest new center. A loop has been generated. As a result of this loop we may notice that the k centers change their location step by step until no more changes are done or in other words centers do not move any more. Finally, this algorithm aims at minimizing an objective function know as squared error function given by: J(v)= ( )2 1 1 xi vj c i ci j −∑∑ = = (1)…..(6) Whereas, ‘||xi - vj||’ is the Euclidean distance between xi and vj ‘ci’ is the number of data points in ith cluster. ‘c’ is the number of cluster centers. The K-Mean algorithm is fast, robust and easier to understand. and gives best results when data set are distinct or well separated from each other. IV. CONCLUSION An acceptable model for data mining which comes up with excellent results of analyzing crime data set; it requires huge historical data that can be used for creating and testing the model.