Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3

Slides:



Advertisements
Similar presentations
Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
Advertisements

CONCEPTUAL WEB-BASED FRAMEWORK IN AN INTERACTIVE VIRTUAL ENVIRONMENT FOR DISTANCE LEARNING Amal Oraifige, Graham Oakes, Anthony Felton, David Heesom, Kevin.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Distributed Data Processing
ICT: A necessity of this age. Agenda What is ICT? Applications and relevance of ICT Merits and De-merits of ICT Steps to Compliance.
Advance Analytics Capabilities
A PRESENTATION TO THE PRESIDENTIAL COMMITTEE ON DEVELOPMENT OF NATIONAL POLICY ON DEPLOYMENT OF E-LEARNING BY THE SECRETARY - UNIVERSAL SERVICE PROVISION.
Cloud Usability Framework
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Building Inclusive Knowledge Societies Session organized by the UNCT in India and other UN entities.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Advances in Technology and CRIS Nikos Houssos National Documentation Centre / National Hellenic Research Foundation, Greece euroCRIS Task Group Leader.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
THIN CLIENT COMPUTING USING ANDROID CLIENT for XYZ School.
DYNAMIC WAP BASED VOTING SYSTEM Bertrand COLAS Submission date: May 2002 School of Computing Bachelor of Engineering with Honours in Computer.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Using SaaS and Cloud computing For “On Demand” E Learning Services Application to Navigation and Fishing Simulator Author Maha KHEMAJA, Nouha AMMARI, Fayssal.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Orientation Workshop on Product Development & Management Functions Workshop 1: Introduction to the Orientation Workshops March 29, 2007 The DSA Project.
THE PROJECT “THE YOUTH AGAINST VIOLENCE”. Project financed from the European Social Fund and implemented by the Ministry of Education, Research and Innovation,
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Providing Seamless Connectivity in E-commerce
IoTs Capabilities. IoTs Capabilities What is IoTs? Control / Information Internet Devices.
HTML5 based Notification System for Updating E-Training Contents Yu-Doo Kim 1 and Il-Young Moon 1 1 Department of Computer Science Engineering, KoreaTech,
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Cloud Computing Shannon McManus Michael Weihert. What is Cloud Computing?
Facebook | Twitter for Law Enforcement Casper Police Department August 3, 2011.
(OBIA) Training & Placement Program By Keen IT To request free demo session please mail us at
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
INTRODUCTION About Project: About Project: Our project is based of the technology of cloud computing which is offering many pro’s to the world of computers.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Chapter-04 Building an Ecommerce Website. Building an E-commerce Site: A Systematic Approach The two most important management challenges in building.
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
April 23, A shared commitment to provide the most effective education to all students so they live successful lives. We envision using technology.
Mukund Nadgowda NeGD Recognized Trainer in e-Governance.
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: Jan 2017 Single.
Computer Science Department, Adeyemi College of Education, Ondo
5G Wireless Technology.
5 G.
Using Big Data clustering for improved security intelligence
An Adaptable e-Service Communication Model for Rural Agricultural Extension (e-AgriSERVICOMM) Olutayo Ajayi , Babarinde Oluwaseyi.
COMP532 IT INFRASTRUCTURE
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
An Adaptable e-Service Communication Model for Rural Agricultural Extension (e-AgriSERVICOM) Olutayo Ajayi , Babarinde Oluwaseyi.
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Information Technology (IT) Department
Algorithms for Big Data Delivery over the Internet of Things
HTML5 based Notification System for Updating
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Basics of computer and ICT
Introduction to Databases Transparencies
3 Cloud Computing.
Smart Learning concepts to enhance SMART Universities in Africa
Copyright © JanBask Training. All rights reserved Become AWS Certified & Get Amazing Job Opportunities.
Web Mining Department of Computer Science and Engg.
Challenges and Successes in the Zambian ICT Security Sector
REMOTE POWER MONITORING OF MARINE SITES
Technology Department Annual Update
Knowledge Sharing Mechanism in Social Networking for Learning
Terms: Data: Database: Database Management System: INTRODUCTION
Project Certification Planning Phase August 27, 2014
Presentation transcript:

A Framework for Unified Distributed System for Crime Prevention and Detection Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3 1Department of ICT, National Defence College, Abuja, Nigeria. 2Computer Science Department, FCT College of Education, Zuba-Abuja, Nigeria. 3ICT Unit, Aduvie International School, Abuja, Nigeria. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Introduction The growth and development of a nation is adjudged largely by her capacity to guaranty the safety of lives and property. The safety of lives and security of property are viewed as basic human rights which are essential to the community’s overall quality of life (Plant and Michael (2009)). Provision of security to citizenry has been a major concern of governments and nations. Some of the notable efforts are the setting up of agencies with the mandate to deal with crime incidents and the deployment of technology for effective crime management. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Problem Statement The rise in crime and the frequency with which they are perpetrated has left the relevant law enforcement agencies with the challenge of proactively responding and preventing crime incidents. Security agencies can not do it alone. Hence, there has been a public outcry on the government to find solutions to this menace of high crime rate. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Aim and Objectives The aim is to develop a framework for the implementation of a unified crime detection and prevention system. While the objectives are to: Develop a unified system, allowing public users to provide tip-off on crime incidents. Implement a distributed architecture for faster data analytics. Warehouse data in multiple datacentres for redundancy. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Methodology Crime Database The proposed method identified four (4) major activities in achieving the research aim Public Interface; Security Agency; Datacenter and Crime Database 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Methodology (Continued) Physical components of proposed system 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Methodology (Continued) Web server – Database Interaction 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Methodology (Continued) Public User Function Provide tip-off and report crime committed Fill online crime data form Upload Video and audio evidence GPS location Use social media platforms to report crime 2. Receive Acknowledgement SMS   Security Agent Function Login to UDSCPD Receive tip-off information on crime. Respond to crime tip-off Share intelligence and crime information with sister security agencies  Data Analytics  Web Server Database A Database B Database C Database D Functional Framework Diagram 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

RESOURCES AND MANPOWER CAPACITY Software tools: Java and Hadoop for the web and database design. High capacity hardware - routers, storage, server computers . Internet access with high bandwidth Qualified manpower. Adequate and up-to-date training. Adequate incentives for personnel Adequate funding for system development, maintenance and upgrade. Confidentiality for public users. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

LIMITATIONS OF THE STUDY Inadequate supply of power. High cost of Internet bandwidth/data for real-time report of crime and prompt response. Not all communities are provided with GSM network coverage. Most public users do not have smart phones to access the mobile application and also give tip-off through social media platforms and GPS. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Conclusion A framework for unified distributed system for crime prevention and detection has been developed. The system is designed to allow tasks to be distributed among participating devices so as to reduce time and increase efficiency. The system offers a public web interface to enable users provide tip-off on crime incidents. The database profiles crime data and notifies concerned security agency about the reported crime incident to enable them take appropriate action. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Conclusion(Cont…) Further research work focuses on: a. Development and implementation of the system. Security of Data. User Access to the system. 3rd Big Data Analytics and Innovation Conference, 22-25 November, NDC, Abuja, Nigeria

Thank you for Listening.