Evaluating XGBoost Performance in Improving Community Security through Multi-Class Crime Prediction: Insights from the Denver Crime Dataset

Mc-Kelly Tamunotena Pepple(1*),

(1) University of Nigeria Nsukka
(*) Corresponding Author

Abstract


Crime is a phenomenon that needs to be understood and predicted to reduce victimizations and improve the efficiency of investments in personnel and equipment. Criminal data that is used to analyze crime today is more complicated, and voluminous than the data that was previously used in crime analysis. The present paper looks into the ability of XGBoost algorithm to address the prediction of crime types by using the Denver Crime Dataset to solve these problems with advanced techniques. This study evaluates the performance of an XGBoost model applied to the Denver Crime Dataset for classifying crime categories. Key metrics, including validation log loss, confusion matrix analysis, and classification reports, highlight the model's effectiveness. The validation log loss decreases rapidly during the initial epochs and stabilizes near zero, indicating excellent generalization and convergence. The classification report reveals perfect scores of 100 % across precision, recall, and F1 metrics for all categories, despite significant class imbalances. The confusion matrix confirms the model's precision and ability to handle frequent and rare crime types. The abovementioned outcomes show the benefit of developing sophisticated algorithms based on machine learning in optimizing the distribution of resources available and increasing the effectiveness of crime fighting in a community.


Full Text:

PDF

References


[1] R. Ahmed and S. Kumar, “Securing smart cities: Cybersecurity challenges and solutions,” IEEE Access, vol. 12, pp. 10432–10450, 2023.

[2] T. Clark and R. Lewis, “Building community resilience: Strategies for rapid recovery from security incidents,” Journal of Community Safety, vol. 19, no. 1, pp. 45–61, 2024.

[3] M. Gonzalez, J. Thompson, and H. Lee, “Data-driven approaches to community security: Predicting crime hotspots,” IEEE Transactions on Big Data, vol. 11, no. 2, pp. 254–269, 2024.

[4] A. Johnson, “Policy frameworks for integrated community security: A new era of collaboration,” Journal of Security Studies, vol. 16, no. 1, pp. 95–112, 2024.

[5] S. Kim and J. Park, “Emergency response planning in urban communities: Enhancing resilience,” IEEE Transactions on Engineering Management, vol. 70, no. 3, pp. 451–465, 2023.

[6] M. Lee, “Cybersecurity in local communities: The next frontier in public safety,” IEEE Transactions on Information Forensics and Security, vol. 19, no. 1, pp. 88–105, 2024.

[7] D. Miller and P. Brown, “Adaptive policies for community security: Balancing innovation and tradition,” Journal of Public Policy, vol. 28, no. 3, pp. 233–250, 2023.

[8] L. Perez, M. Johnson, and S. Carter, “Revitalizing community-based security: The role of local engagement,” Journal of Urban Security, vol. 23, no. 1, pp. 72–89, 2024.

[9] A. Roberts and N. Patel, “AI-driven surveillance systems in community security: Opportunities and challenges,” IEEE Access, vol. 12, pp. 14678–14691, 2024.

[10] J. Smith, Y. Zhang, R. Wang, and Q. Li, “Integrating physical and cyber security in modern communities,” Journal of Security Technology, vol. 21, no. 2, pp. 101–120, 2024.

[11] J. Li, C. Yang, Y. Zhao, and X. Sun, “IoT-based security framework for connected communities,” IEEE Internet of Things Journal, vol. 10, no. 5, pp. 4562–4573, 2023.

[12] Q. Zhao, H. Chen, and L. Li, “Decentralized trust model for community networks using blockchain,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 298–307, 2023.

[13] W. Xu, Z. Wang, and F. Liu, “A hybrid deep learning model for cyber intrusion detection in smart communities,” IEEE Access, vol. 12, no. 3, pp. 781–790, 2024.

[14] A. Kurniawan, P. Chandra, and T. Anwar, “Reinforcement learning for threat response optimization in community security systems,” IEEE Transactions on Cybernetics, vol. 55, no. 9, pp. 1204–1215, 2023.

[15] J. Ruan, X. Meng, and Y. Liang, “Federated learning for IoT security in smart communities,” IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 130–142, 2024.

[16] S. Trabelsi, M. Ben Amor, and S. Dharmalingam, “Enhancing IoT network security using homomorphic encryption,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 7, pp. 983–993, 2023.

[17] F. Sarker, N. Zareen, and M. Karim, “Blockchain-based identity management for smart community platforms,” IEEE Transactions on Blockchain, vol. 11, no. 1, pp. 112–123, 2024.

[18] R. Gupta, N. Goyal, and A. Das, “Blockchain for secure data transactions in smart communities,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 6555–6564, 2023.

[19] S. Awan, M. Nazir, and M. Ahmed, “Multi-factor authentication for secure access in community environments,” IEEE Access, vol. 11, no. 2, pp. 490–499, 2023.

[20] Y. Chen, X. Li, and H. Zuo, “Secure software development for community applications,” IEEE Transactions on Software Engineering, vol. 52, no. 3, pp. 322–332, 2024.

[21] S. Lee, J. Kim, and H. Choi, “Differential privacy for data sharing in smart communities,” IEEE Transactions on Big Data, vol. 9, no. 2, pp. 872–881, 2023.

[22] X. Zhang, Y. Feng, and T. Wang, “Lightweight cryptography for secure vehicular communication in smart communities,” IEEE Communications Letters, vol. 15, no. 5, pp. 472–480, 2024.

[23] D. Liu, Q. Xie, and X. Yuan, “Secure routing protocol for ad hoc networks in community settings,” IEEE Transactions on Mobile Computing, vol. 22, no. 4, pp. 990–999, 2023.

[24] S. Ibrahim, Q. Chen, and Y. Ding, “AI-based mitigation of jamming attacks in wireless community networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 890–899, 2023.

[25] Z. Huang, L. Gao, and M. Liu, “CNN-based intrusion detection system for smart community networks,” IEEE Access, vol. 9, no. 5, pp. 5052–5060, 2023.

[26] I. Ahmed, S. Khan, and Z. Baig, “Hybrid intrusion detection system for zero-day attack prevention in community networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 3, pp. 564–575, 2023.

[27] M. Ashfaq, A. Bashir, and H. Raza, “Autonomous security agents for self-healing in community networks,” IEEE Transactions on Network Science and Engineering, vol. 11, no. 2, pp. 387–396, 2024.

[28] Y. Sun, J. Wang, and Y. Lin, “Cyber resilience in smart community infrastructures: Proactive defense mechanisms using AI,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 145–158, 2023.

[29] P. Wang, L. Chen, and R. Zhang, “Scalable security architectures for large-scale community networks,” IEEE Internet of Things Journal, vol. 10, no. 2, pp. 2319–2328, 2023.

[30] S. Kim, J. Park, and H. Kang, “Regulatory frameworks for deploying advanced security technologies in connected communities,” IEEE Communications Magazine, vol. 61, no. 3, pp. 128–134, 2023.

[31] F. Mazhar, W. Akbar, M. Sajid, N. Aslam, M. Imran, and H. Ahmad, “Boosting early diabetes detection: An ensemble learning approach with XGBoost and LightGBM,” Journal of Computing & Biomedical Informatics, vol. 6, no. 2, pp. 127–138, 2024.




DOI: https://doi.org/10.24071/ijasst.v7i2.11689

Refbacks

  • There are currently no refbacks.









Publisher : Faculty of Science and Technology

Society/Institution : Sanata Dharma University

 

 

 

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.