CRIME RATE PREDICTION AND ANALYSIS USING LSTM ALGORITHM
DOI:
https://doi.org/10.29121/ijetmr.v12.i3.2025.1554Keywords:
Prediction Of Crime Hotspots, Machine Learning, LSTM, Built EnvironmentAbstract
Routine Activity Theory explains that crimes happen when three elements come together: a motivated offender, a suitable target, and no capable guardian. Rational Choice Theory adds that offenders weigh risks, effort, and rewards before acting. Crime Pattern Theory combines these ideas, showing that offenders rely on familiar areas (their "cognitive maps") when choosing crime locations. Crime hotspots emerge in places that either create or attract criminal opportunities, influenced by past crimes and environmental factors. The proposed crime prediction system combines machine learning algorithms like Random Forest, KNN, SVM, and LSTM. Initially, only historical crime data are used to train these models and identify the best-performing one. Later, environmental factors such as road density and points of interest (POI) are added to assess if prediction accuracy improves. KNN classifies data by finding the nearest neighbors based on input features, using majority or weighted voting. Meanwhile, Naive Bayes (NB) predicts outcomes using probabilities and assumes that input features are independent, making it a simple yet effective classification method.
Downloads
References
Andresen, A., & Malleson, J. (2015). Testing the Stability of Crime Patterns. Journal of Quantitative Criminology, 31(4), 671–693. https://doi.org/10.1007/s10940-014-9228-7 DOI: https://doi.org/10.1186/s40163-015-0024-7
Chainey, D. L., & Ratcliffe, G. (2013). GIS and Crime Mapping (2nd ed.). John Wiley & Sons.
Gerber, S., & Purves, M. (2009). Exploring the Spatial Dynamics of Crime Using Agent-Based Modeling. Computers, Environment and Urban Systems, 33(2), 147–158. https://doi.org/10.1016/j.compenvurbsys.2008.07.006
Groff, P., & LaVigne, J. (2012). Forecasting the Future of Predictive Policing. Crime Prevention and Community Safety, 14(3), 159–176. https://doi.org/10.1057/cpcs.2012.1 DOI: https://doi.org/10.1057/cpcs.2012.1
Kennedy, L. W., Caplan, J. M., & Piza, E. (2011). Predicting Crime Through Risk Terrain Modeling: A Validation Analysis. Criminology, 49(1), 21–45. https://doi.org/10.1111/j.1745-9125.2010.00217.x DOI: https://doi.org/10.1111/j.1745-9125.2010.00217.x
Malladi, R., Jayaweera, S. K., & Jarvis, R. J. (2014). Spatial Data Mining for Crime Analysis Using Density-Based Clustering. International Journal of Geographical Information Science, 28(1), 118–138. https://doi.org/10.1080/13658816.2013.831868 DOI: https://doi.org/10.1080/13658816.2013.831868
Mohler, A., Short, M. B., Bertozzi, S., Brantingham, P. J., Tita, F., & Kolokolov, G. O. (2011). Self-Exciting Point Process Modeling of Gang Violence. Journal of the American Statistical Association, 106(493), 6–21. https://doi.org/10.1198/jasa.2011.ap09546 DOI: https://doi.org/10.1198/jasa.2011.ap09546
Ratcliffe, J. (2000). The Spatial Victims of Crime: A Test of Routine Activity Theory in Place (PhD Dissertation). Rutgers University-Newark.
Wang, D., Ding, Y., & Zhang, X. (2019). A Hybrid Model For Crime Prediction Using Social Media Data and Spatial-Temporal Features. Information Sciences, 488, 1–17. https://doi.org/10.1016/j.ins.2019.02.049 DOI: https://doi.org/10.1016/j.ins.2019.02.049
Yu, L., Wang, S., & Lai, L. (2018). A Deep Learning Approach for Crime Prediction using Multi-Source Data. In Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 1195–1200). IEEE. https://doi.org/10.1109/ICDMW.2018.00172 DOI: https://doi.org/10.1109/ICDMW.2018.00172
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dr. D J Samatha Naidu, Yamini Priya K.

This work is licensed under a Creative Commons Attribution 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section