Geo Crime Mapper Report
Geo Crime Mapper Report
Geo-Crime Mapper
A PROJECT REPORT
Submitted to
Submitted by
November 2024
Parash Mishra
Tribhuvan University
Supervisor’s Recommendation
I hereby recommend that this project prepared under my supervision by Ishan Shrestha
entitled “Geo-Crime Mapper” in partial fulfillment of the requirements for the degree of
Bachelor of Computer Application is recommended for the final evaluation.
___________________
Parash Mishra
BCA Department
i
Tribhuvan University
LETTER OF APPROVAL
This is to certify that this project prepared by Ishan Shrestha entitled “Geo Crime
Mapper” in partial fulfillment of the requirements for the degree of Bachelors in
Computer Application has been evaluated. In our opinion it is satisfactory in scope and
quality as a project for the required degree.
…………………………….. …………………………………
…………………………….. ……………………………..
ii
Abstract
iii
ACKNOWLEDGEMENT
This project is prepared in partial fulfilment of the requirement of 4th Semester Project-I.
The satisfaction and success of completion of this task would be incomplete without
heartfelt thanks to people whose constant guidance, support, and encouragement made
this work successful. In doing this undergraduate project we have been fortunate to have
help, support, and encouragement from many people. We would like to acknowledge
them for their cooperation.
We would like to thank St. Lawrence College for providing us a huge platform to gain
knowledge about different aspects of Computer Science and Information Technology.
We would like to thank our Supervisor Mr. Parash Mishra who persuaded and
continuously guided us during the whole course of our project. We would also like to
thank him for providing us with the necessary content and classes regarding the project.
We are also grateful to Mr. Raj Kumar Shrestha for acting as our supervisor and showing
immense patience and understanding throughout the project and provided suggestions.
Last, but not least, we also take this opportunity to thank our friends and colleagues for
their support and feedback throughout this project.
With Regards,
ISHAN SHRESTHA (Exam Roll No. 78802011, T.U. Reg. No. 6-2-788-45-2020)
iv
Table of Contents
Supervisor’s Recommendation.............................................................................................i
LETTER OF APPROVAL...................................................................................................ii
Abstract...............................................................................................................................iii
ACKNOWLEDGEMENT..................................................................................................iv
Table of Contents.................................................................................................................v
List of Abbreviations........................................................................................................viii
List of Figures.....................................................................................................................ix
List of Tables.......................................................................................................................xi
Chapter 1: Introduction........................................................................................................1
1.1 Introduction................................................................................................................1
1.3 Objectives...................................................................................................................2
1.4.1 Scope...................................................................................................................2
1.4.2 Limitations..........................................................................................................3
v
Chapter 3: System Analysis and Literature Review.............................................................9
4.1 Implementation........................................................................................................26
4.2 Testing......................................................................................................................29
5.1 Conclusion................................................................................................................40
vi
5.2 Learning Outcomes..................................................................................................40
Appendices.........................................................................................................................43
Screenshot......................................................................................................................43
References..........................................................................................................................53
vii
List of Abbreviations
viii
List of Figures
Figure 1.5: Waterfall Model 3
Figure 3.1.1: Use Case Diagram 10
Figure 3.1.3: ER Diagram 13
Figure 3.1.4: DFD Level 0 14
Figure 3.1.4: DFD Level 1 15
Figure 3.2.1: Architecture Design 16
Figure 3.2.2: Database Schema Design part 1 17
Figure 3.2.2: Database Schema Design Part 2 18
Figure 3.2.2: Database Schema Design Part 3 19
Figure 3.2.3: UI Design Login 20
Figure 3.2.3:UI Design Register 20
Figure 3.2.3: UI Design Admin Page 21
Figure 3.2.3: UI Design Profile 21
Figure 3.2.4: Physical DFD User 22
Figure 3.2.4: Physical DFD Admin 23
Figure 16: Login Page43
Figure 17: User Registration Page 43
Figure 18: Forget Password 44
Figure 19: Dashboard 44
Figure 20: Crime List Page 45
Figure 21: Crime Detail page 46
Figure 22: Analysis List 46
Figure 23: Create New Analysis 47
Figure 24: View Analysis 47
Figure 25: Create DBSCAN Config 48
Figure 26: DBSCAN Configuration Lists 48
Figure 27: DBSCAN Result Visualization 49
Figure 28: View/Update Profile, Change password 50
Figure 29: Admin Dashboard 51
Figure 30: Admin User List 52
Figure 31: Admin Crime Report List 52
ix
List of Tables
Table 4.2.1: Test Case for User Registration Module 30
Table 4.2.1: Test Case for User Authentication Module 30
Table 4.2.1: Test Case for Forget Password Module 31
Table 4.2.1: Test Case for Admin Crime Module 32
Table 4.2.1: Test Case for Analysis Module 32
Table 4.2.1: Test Case for DBSCAN Analysis Module 34
Table 4.2.2: System Testing for User Authentication and Registration 36
Table 4.2.2: System Testing for Admin Crime Module 37
Table 4.2.2: System Testing for DBSAN analysis 38
x
Chapter 1: Introduction
1.1 Introduction
Crime is an intentional act that breaks the law, can be prosecuted and punished by the law.
It ranges from minor offenses, like stealing small items, to serious acts, like harming
another person. Minor offenses include actions such as trespassing, vandalism,
shoplifting, threats and so on. These typically results in lighter punishment, community
service and fines. On the other end, serious offenses include assault, robbery, burglary,
murder, rape and so on. Unlike minor offenses, these offences carry severe punishment,
including, life imprisonment, hefty fines and even death penalty. The severity of crime
often determines the intensity level of the legal consequences, aiming to both punish the
offender and deter others from engaging in similar unlawful behavior.
There are many definitions of crime from different perspectives. Edwin H. Sutherland, a
renowned criminologist, defined crime as "a behavior which is prohibited by the state as
an injury to the state and against which the state may react, at least as a last resort, by
punishment" [1].
In recent years, with the advancement in technology and data science, crime data analysis
and visualization have changed the way societies, states, or government respond to, and
prevent crime. It has empowered policymakers, lawmakers, law enforcement agencies,
researchers and other stakeholders to get involved deeper into crime data, extracting
meaningful insights that were previously inaccessible. With analytical tools and
visualization techniques, such as Geographic Information System (GIS), machine
learning algorithms, and interactive dashboards, stakeholders can uncover patterns,
trends, correlations and much more with vast datasets.
Historically, crime analysis primarily relied on manual methods and statistical analysis.
The advent of technology such as big data and computational techniques has increased
the complexity and scope of crime analysis. For example, predictive model algorithms
can forecast crime hotspots based on historical data, enabling efficient and rapid
deployment of resources and interventions. Moreover, machine learning algorithms like
DBSCAN (Density-Based Spatial Clustering of Applications with Noise) and GIS tools,
1
aiding in identification of high-risk hotspots, anomaly detection, pattern recognition and
the evaluation of implemented strategies.
In context of Nepal, there are no crime analysis and visualization tools. The problems are
as follows: -
i. Tools like ArcGIS, QGIS, and so on provide features but need technical expert to
use them.
ii. Open-Source software/web applications provide mapping features but do not
provide advanced features like Machine Learning Algorithms.
1.3 Objectives
1.4.1 Scope
Geo-Crime Mapper, a crime data and analysis and visualization system encompass
several key areas. It aims to empower law enforcement agencies, policy makers, and
community stakeholders by offering tools to analyze crime incidents geographically and
over time. It will enable users to visually identify and map crime hotspots, trends and
patterns. User-friendly design and robust security measures will be prioritized to enhance
2
accessibility and safeguard sensitive information. Continuous refinement based on user
feedback and emerging crime trends will ensure that Geo-Crime Mapper remains a
valuable tool for enhancing public safety and community well-being.
1.4.2 Limitations
There are some criteria that may not be fulfilled by our application. Some of the
limitations of our project are mentioned below:
i. Insights rely on accurate and complete crime data; poor data quality can lead to
misleading conclusions.
ii. Predictive analytics, like DBSCAN, require careful tuning for reliable results.
iii. Sensitive data needs strong protection to maintain trust and legal compliance.
iv. May be less effective in areas with sparse data or inconsistent geospatial
boundaries, impacting the accuracy of spatial analyses.
v. Advanced analytics, especially for large datasets or complex models, require
significant computing power, which may be costly or unavailable in some settings.
vi. Regular updates are essential to keep algorithms, data sources, and security
measures current, which requires ongoing resource investment.
Design Deployme
Requirements Integration
and Implementation nt and
Gathering and Testing
Analysis Maintaince
3
The sequential phases in Waterfall model are as follows: -
This document presents the organization of the report for the Geo-Crime Mapper project.
It includes various charts, diagrams, and schemas that illustrate the system's architecture
and design, as well as information on the tools and technologies used in the system’s
development. The report is structured as follows across five chapters:
4
iv. Chapter 4: Implementation and Testing: This chapter discusses the tools used for
implementing the system and the various types of testing conducted. It also
presents test cases that were developed to verify and validate the system’s
functionality and performance.
5
Chapter 2: Background Study and Literature Review
GIS plays a central role in the Geo-Crime Mapper by allowing users to visualize data on a
map, revealing spatial relationships and crime patterns that may not be apparent through
tabular data alone. It comprises essential components such as hardware (computers and
servers), software (mapping and analytical tools), data (geographic and tabular
information), methods for processing spatial data, and the people who interact with the
system. In crime analysis, GIS is instrumental in pinpointing locations with high crime
concentrations and observing trends over time, which supports law enforcement agencies
in strategic decision-making and timely interventions.
Data privacy is also a crucial concern, as crime-related data often contains sensitive
information about victims and locations; therefore, managing privacy while balancing
accessibility is vital. Additionally, user roles and permissions allow for secure access
control, ensuring that only authorized personnel can access or modify certain information.
Data visualization techniques are another integral part of Geo-Crime Mapper, allowing
stakeholders to interpret complex crime data effectively. Maps and charts are used to
make the data more accessible to users, especially non-technical stakeholders. Maps are
the primary method for viewing spatial distributions, charts and graphs provide insights
into crime trends and patterns over time.
The literature on crime mapping and analysis provides a strong foundation for developing
tools like Geo-Crime Mapper. As it provides several projects, ideas, and theories
contributing valuable insights. Many studies have demonstrated the effectiveness of
Geographic Information Systems (GIS) in mapping crime and analyzing spatial data,
enabling law enforcement to identify crime patterns and allocating resources effectively.
For instance, one of the projects in crime mapping was the Chicago Crime Mapping
Project, which used GIS to reveal patterns in crime data across the city, leading to
targeted policing efforts. This project underscored the potential of GIS in aiding decision-
making, especially in urban settings where spatial patterns of crime are complex and
varied.
Another tool, CompStat (short for Computer Statistics), was developed in the 1990s by
the New York Police Department (NYPD). CompStat combined GIS with statistical
analysis used to track and manage crime data, creating weekly reports that helped identify
trends and hotspots in near real-time. This approach allowed law enforcement to make
strategic interventions based on data. CompStat’s success popularized the use of spatial
analysis in law enforcement and highlighted the value of timely, accurate crime data in
supporting effective policing [2].
7
On the theoretical side, clustering algorithms have gained attention for their ability to
analyze spatial distributions and detect patterns in crime data. DBSCAN (Density-Based
Spatial Clustering of Applications with Noise), for example, is widely applied in spatial
analysis to identify natural clusters in crime data without requiring pre-set parameters.
DBSCAN's effectiveness in recognizing clusters based on density, rather than distance. It
is particularly valuable for crime analysis, where incidents are often distributed unevenly
across geographic areas. For example, studies applying DBSCAN to urban crime data
have shown how it can effectively group crime events and help visualize where law
enforcement might focus their efforts.
8
Chapter 3: System Analysis and Literature Review
The requirements are very important for any software before any kind of development. It
is the collection of features that the user wants in the software. There are two types of
requirements. They are functional and non-functional requirements. Both are discussed
below:
9
3.1.1.1 Functional Requirements
10
3.1.2 Feasibility Analysis
The feasibility analysis for Geo-Crime Mapper explores various aspects to determine
whether the proposed system can effectively address the needs of stakeholders and be
implemented successfully. This analysis considers technical, operational, economic, and
legal aspects to ensure the solution is viable, sustainable, and compliant with relevant
standards and regulations.
Technical feasibility evaluates the technology required to develop and implement the
Geo-Crime Mapper system and whether it is feasible within the available resources and
constraints. The system is technically feasible with the available tools and technologies.
Its performance and scalability will be ensured using optimized geospatial data storage
and visualization techniques. For this feasibility study, we studied complete functionality
to be provided in the system, as described in the System Requirement Specification
(SRS), and checked if everything was possible using different types of front-end and
back-end platform.
Operational feasibility assesses whether the proposed system can function effectively
within its intended operational environment, ensuring ease of use for the stakeholders
involved. The system has a graphical user interface (GUI) that is intuitive and easy to use
for both technical and non-technical users. Besides, proper training has been conducted to
related stakeholders.
Economic feasibility examines the financial implications of the system, including the
costs associated with its development, deployment, and ongoing maintenance, and the
expected benefits. All the programming languages, tools and resources required are free
and open source. No additional hardware and software required after the completion of
the system. Thus, this system is economically feasible and cost-effective.
11
3.1.2.4 Legal Feasibility
Legal feasibility involves ensuring that the system complies with all relevant legal and
regulatory requirements, especially in terms of data privacy, security, and user rights. We
have ensured that our platform complies with all relevant laws and regulations related to
data privacy and protection, so it is legally feasible.
12
3.1.3 Data Modelling: Entity Relationship (ER) Diagram
13
3.1.4 Process Modelling: Data Flow Diagram (DFD)
DFD of Book Geo-Crime Mapper consists of one level DFD and two level DFD. Both
diagrams show how the data flows inside the system
14
Figure 3.1.4: DFD Level 1
Three Tier Architecture design is used to create this system. This system includes a user
interface (Presentation Layer), a web server (Application Layer), and a database (Data
Layer).
15
Figure 3.2.1: Architecture Design
16
3.2.2 Database Schema Design
17
Figure 3.2.2: Database Schema Design Part 2
18
Figure 3.2.2: Database Schema Design Part 3
Interface Design is the design of how this system Geo-Crime Mapper looks like:
19
Figure 3.2.3: UI Design Login
20
Figure 3.2.3: UI Design Admin Page
21
3.2.4. Physical DFD
A physical data flow diagram is a visual representation that shows how data flows
between the system components. For this system, the physical data flow diagram is
illustrated below:
22
Figure 3.2.4: Physical DFD Admin
23
area, distinguishing between core points, which form the cluster’s core, border points,
which lie on the cluster edges, and noise, which represent isolated or less relevant points.
This flexibility in cluster formation is advantageous when analyzing crime patterns, as
crime data can vary greatly in density across different regions.
In the Geo-Crime Mapper, DBSCAN serves as a primary tool for identifying crime
“hotspots” by clustering incidents based on spatial proximity and, optionally, temporal
constraints. This clustering reveals patterns of high-crime zones where incidents
frequently occur within a particular radius and time frame. Such insights are valuable for
law enforcement agencies and policymakers, as they can guide resource allocation to
areas of heightened risk. DBSCAN’s relevance to Geo-Crime Mapper lies in its ability to
analyze and visualize crime data effectively, enabling users to detect spatial patterns
without prior assumptions about the number or shape of clusters.
DBSCAN requires two key parameters: Epsilon (ε) and Minimum Points. The Epsilon
parameter defines the maximum radius for searching neighboring points, effectively
setting the spatial reach for cluster formation. In the context of Geo-Crime Mapper,
Epsilon is carefully calibrated to capture crime incidents within a reasonable spatial range
—such as within a neighborhood or city block. Minimum Points is the minimum number
of neighboring points required to consider a point as a core point, ensuring that clusters
form only in areas with sufficient data density. This parameter helps filter out isolated
incidents, which are often less relevant for identifying significant patterns [3].
DBSCAN(D, ε, MinPts)
mark p as visited
neighbors = regionQuery(p, ε)
mark p as noise
else
24
create new cluster C
add p to cluster C
if n is not visited
mark n as visited
new_neighbors = regionQuery(n, ε)
add n to cluster C
25
Chapter 4: Implementation and Testing
4.1 Implementation
The tools and techniques used to implement the system and the implementation details of
various modules of Geo-Crime Mapper are as follows:
The tools used in the process of creating this system are as follows:
i. Front-End Tools
a. HyperText Markup Language (HTML)
In Book Review Platform, HTML is used for creating the skeleton of
different web pages and sites. It is used to create sections, headings, links,
paragraphs, image sections and so on.
b. Cascading Style Sheet (CSS)
CSS is used to design different tags and elements of HTML. By using
CSS, we can control the font style, font size, text color, space between
characters, image properties, and so on.
c. JavaScript
In Geo-Crime Mapper, JavaScript is used for making dynamic, interactive,
and responsive web pages.
d. OpenLayers
OpenLayers is a powerful JavaScript library utilized in Geo-Crime Mapper
to provide dynamic and interactive mapping functionalities. It serves as the
backbone for rendering geographic data, enabling users to visualize crime
locations, clusters, and patterns on an intuitive map interface.
e. Chart.js
Chart.js is a lightweight and versatile JavaScript library used in Geo-Crime
Mapper for creating interactive and visually appealing data visualizations.
It plays a key role in presenting crime statistics and analytical results
through various chart types, including bar charts, line charts, pie charts,
and scatter plots.
ii. Back-End Tools
26
a. Python Programming Language
In Geo-Crime Mapper, Python is used as a server-side language. It is a
high level, general-purpose programming language. The Django
framework, built on Python, provides a robust structure for developing the
application’s backend, including models, APIs, and business logic.
Additionally, Python’s GeoDjango module and libraries such as shapely
and geopandas enhance the system’s geospatial processing capabilities.
iii. Server
a. NGINX
In this system, serves as the reverse proxy and web server, handling client
requests and efficiently routing them to the application server. It improves
performance through load balancing, caching, and static file serving. Its
lightweight design and high scalability make it well-suited for the
deployment of this project, ensuring reliable performance under varying
loads.
iv. Database
a. PostgreSQL
PostgreSQL is the database management system used for storing and
managing the system’s structured data. Its robustness, scalability, and
support for advanced features make it ideal for the backend of Geo-Crime
Mapper. To handle geospatial data, PostGIS, an extension of PostgreSQL,
is employed. PostGIS provides spatial types like points, polygons, and
lines, enabling precise storage and querying of geographical data. It also
supports advanced spatial queries, which are crucial for identifying crime
hotspots, filtering data by geographic regions, and performing clustering
analyses. The combination of PostgreSQL and PostGIS ensures that the
application can efficiently handle both relational and spatial data.
v. Documentation Tools
a. Draw.io
It is an online system design tool. It is used to create architectural design,
Entity-Relation Diagram, User Case Designs and so on.
b. Dbdiagram.io
It is an online database schema design tool and is used to create database
schema for Geo-Crime Mapper.
27
c. Figma
It is an online UI/UX design tool to design the Graphical User Interface
(GUI) of this system
The Geo-Crime Mapper system is modularized into various components, each serving a
specific functionality. Details of different modules of this system are described below:
Administrators can define, update, and manage various crime types within the
system. This module ensures a consistent taxonomy for classifying and analyzing
crime data, which is crucial for reports and clustering analyses
e. Admin Crime Types Modules
Administrators can define, update, and manage various crime premises within the
system. This module ensures a consistent taxonomy for classifying and analyzing
crime data, which is crucial for reports and clustering analyses
f. DBSCAN Analysis Module
This specialized module implements the DBSCAN algorithm for clustering spatial
crime data. It identifies crime hotspots and noise, helping administrators and
analysts focus on high-crime areas for actionable insights.
28
g. User DBSCAN Result Visualization Module
The DBSCAN Result Visualization Module is designed to present the outcomes of
the DBSCAN clustering algorithm in an intuitive and interactive format. After the
clustering process, this module maps the identified clusters and noise points onto
the application’s interface, using tools like OpenLayers. Clusters are visualized
with distinct colors and markers, while noise points are highlighted differently for
clarity.
h. User Registration Module
This module facilitates user sign-up, allowing individuals to register their
accounts. Validation processes ensure secure account creation while capturing
essential user details.
i. User Authentication Module
The authentication module manages secure user login and logout. It includes
mechanisms like password encryption and session management, ensuring the
integrity and security of user access.
j. Forget Password Module
This module provides a secure mechanism for users to reset forgotten passwords.
It employs email verification and a secure token generation to protect against
unauthorized access.
k. Crime Dashboard Module
The dashboard module is the central interface for administrators and users,
displaying summarized crime data through interactive charts, maps, and tables. It
provides real-time insights and quick access to key functionalities.
4.2 Testing
Testing refers to the process of evaluating the system or a software application to identify
the bugs, defects, and vulnerabilities to ensure that it meets the specified requirements
and verify it is working correctly. Its primary goal is to ensure the quality and reliability
of the software before it is deployed for production. The testing is carried out over and
over in the development phase.
29
4.2.1 Test Cases for Unit Testing
30
and dashboard. and was
password. redirected to
3. Click the
"Login". dashboard
2 User is 1. Open Error The error Pass
successfully Test login the login message message
logged in and with page. "Login "Logn
redirected to 2. Enter Failed" is Failed" was
the dashboard. invalid invalid displayed, displayed,
credentials. username and login is and login
or prevented. was
password. prevented.
3. Click
"Login"
2. Enter a
registered
email.
3. Submit
the form.
4. Check
the email
inbox for
the reset
link.
2 Forget Test Error The error Pass
Password password 1. Open the message " message "
Module reset with "Forget An An account
an invalid account with this
email. Password" with this email does
page. email not exist"
does not was
exist" is displayed,
31
displayed, and no reset
2. Enter an and no link was
unregistered reset link sent
is sent.
email.
3. Submit
the form.
32
valid
coordinates
and details.
4. Click
"Submit".
33
4. Click
"Submit".
4 Create Test Analysis is Analysis Pass
Analysis creating an 1. Open created was created
analysis analysis with the with the
section correction correction
page. location location
2. Add area. area.
details,
select
analysis
type, and
draw a
location
area to
perform
analysis
2. Add
radius
and
minimum
samples.
3. Click
on Save.
34
2 Run DBSCAN Run a 1. Go to Message Message Pass
analysis DBSCAN analysis, “Task “Task
analysis select an Started” is Started” was
analysis, displayed, displayed,
then and “Task and “Task
select a Completed” Completed”
DBSCA after some after some
N config. time. time.
2. Hit the
Play icon
36
(username, and was
email, redirected
password, to
etc.). dashboard
3. Register.
4. Log in
with the
same
credentials.
2 User Test the 1. Open Error The error Pass
Registration & behavior the message message
Authenticatio when the registration "Email "Email
n user tries to page. already already
register 2. Enter a exists" is exists" was
with an registered shown, and displayed,
existing email and registration and
email. valid does not registration
details. proceed. was
3. Click cancelled.
"Register".
3 Forget Test 1. Open A reset link A reset link Pass
Password password the "Forget is sent to was sent to
Module recovery Password" the email, the email,
for a page. and the user and the user
registered 2. Enter a can log in logged in
user. valid with the with the
email. new new
3. Reset password. password.
the
password
and log in
with the
new
credentials.
37
report. changes and changes and
4. Save the visible in was visible
changes. the report in the report
list. list.
2 Admin Test adding 1. Log in as The crime Pass
Crime and editing admin. The crime location was
Location crime 2. Add a location is added
Module locations crime successfully,
from the location added then
admin with valid successfully updated
panel. coordinates. with the
3. Edit the , then correct
location. updated changes and
4. Save the was visible
changes. with the on the map.
correct
changes and
visible on
the map.
38
2 DBSCAN Test the 1. Run Clusters are Clusters Pass
Result proper DBSCAN displayed were
Visualization visualization clustering. with distinct displayed
of 2. View the markers, with distinct
DBSCAN clusters on markers
results with the map. colors
crime 3. Hover
clusters. over
clusters for
details.
4. Zoom
in/out.
3 Crime Detail Test the 1. Open the The map The map Pass
Map functionality crime zooms and zooms and
of the crime detail. pans pans
detail’s map 2. Zoom smoothly smoothly
view and in/out on while while
interactivity. the map. displaying displaying
3. View accurate accurate
crime data crime data crime data
point. point. point.
39
Chapter 5: Conclusion and Future Recommendation
5.1 Conclusion
The development and implementation of the Geo-Crime Mapper system provided several
valuable lessons, experience, achievement and insights across various aspects of software
development, system design and geospatial analysis. One of the most significant learning
experiences was understanding and working with geospatial data. We learned how to
efficiently store, query, and manipulate spatial data such as crime locations using
geographic coordinates and other geometry types, which is a challenging but essential
aspect of any GIS-based application. Open Layers played a key role in visualizing this
data on interactive maps, which required careful integration to ensure smooth rendering
and dynamic updates.
40
Another key takeaway from the project was the implementation of DBSCAN for spatial
clustering. DBSCAN is a powerful algorithm for identifying clusters in spatial data,
especially when dealing with noise.
A critical aspect of the project was user experience design. The system was designed to be
accessible to both technical and non-technical users, which required a careful balance
between functionality and ease of use. The integration of frameworks like TailwindCSS
for responsive design and Chart.js for visualizing crime data trends allowed us to create a
clean and intuitive interface. This experience highlighted the importance of UX/UI design
in ensuring that users can interact with complex systems in an intuitive and engaging
manner, without needing deep technical knowledge.
Overall, the Geo-Crime Mapper project not only deepened our technical expertise in areas
such as geospatial analysis and system design but also provided valuable lessons in user-
centered development, security practices, and system scalability.
41
decision trees, neural networks, or reinforcement learning, the system could
provide actionable insights for crime prevention.
iv. User Customization
Allowing users to customize the dashboard with their preferred crime categories,
time ranges, and display options could improve the overall user experience.
Personalizing the interface would make it easier for users to focus on the data that
matters most to them.
42
Appendices
Screenshot
43
Figure 5: Forget Password
Figure 6: Dashboard
44
Figure 7: Crime List Page
45
Figure 8: Crime Detail page
46
Figure 10: Create New Analysis
47
Figure 12: Create DBSCAN Config
48
Figure 14: DBSCAN Result Visualization
49
Figure 15: View/Update Profile, Change password
50
Figure 16: Admin Dashboard
51
Figure 17: Admin User List
52
References
53