CFP last date
20 May 2024
Reseach Article

Analysis of Stock Crime using Graph Mining

by Jigyasha Arora, Pawan Kumar Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 14
Year of Publication: 2014
Authors: Jigyasha Arora, Pawan Kumar Mishra
10.5120/17079-7527

Jigyasha Arora, Pawan Kumar Mishra . Analysis of Stock Crime using Graph Mining. International Journal of Computer Applications. 97, 14 ( July 2014), 37-40. DOI=10.5120/17079-7527

@article{ 10.5120/17079-7527,
author = { Jigyasha Arora, Pawan Kumar Mishra },
title = { Analysis of Stock Crime using Graph Mining },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number14/17079-7527/ },
doi = { 10.5120/17079-7527 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:41.206575+05:30
%A Jigyasha Arora
%A Pawan Kumar Mishra
%T Analysis of Stock Crime using Graph Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 14
%P 37-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Graph mining is the use of most important structure of graph to obtain frequent patterns of information. It has board range of applications. This technique can be used to find the probability of persons doing crime in the stock market . Some case studies of people involved in stock crime were studied to obtain the attributes such as persons involved in crime, whether they are educated or not, style of crime, earning from the particular threat. These attribute lead to the construction of graph database and an algorithm has been proposed which replaces previously existing graph mining algorithm which was unable to generate subgraph for non immediate nodes. Proposed algorithm deals with large database including the features which captures the properties of graph in few parameters and establish relationship among nodes. It then adopts depth first search approach to traverse the graph in top down manner which finds the common node in the graph & establishing subgraph for both immediate & non immediate nodes. Supervised approach has been used that provides correct segmentation of training data. For the prediction of future crime, a new framework as been designed which determines the suspicious behaviour if similar crime has been occurred before based on property such as style of crime which therefore can prevent many crimes that can occur in future. We have used the NetBeans for implementing the algorithm, Neo4j for graph database and NeoEclipse for analysis of graph.

References
  1. Xifeng Yan and Jiawei Han,"gSpan: Graph-Based Substructure Pattern Mining", 2002.
  2. Xifeng Yan, Phlip S. Yu and Jiaweli Han: Graph Indexing, A Frequent Structure Based Approach, 2004.
  3. Ingrid Fischer and Thorsten Meinl,"Graph Based Molecular Data Mining - An Overview", IEEE 2004.
  4. Deepayan Chakrabarti, Yiping Zhan and Christos Faloutsos,"R-MAT: A Recursive Model for Graph Mining", School of Computer Science, CMU, 2004.
  5. Hsinchun Chen, WingyanChung, Jennifer Jie Xu, Gang Wang Yi Qin and Michael Chau," Crime Data Mining:A General Framework and Some Examples", IEEE 2004.
  6. Katsutoshi Yada1, Hiroshi Motoda, Takashi Washio, and Asuka Miyawaki1, "Consumer Brhavior Analysis by Graph Mining Technique", M. G h. Negoita et al. (Eds. ): KES 2004, LNAI 3214, pp. 800–806, Springer 2004.
  7. Lisa Singh, Mtchell Beard and Lis Getoor: Visual Mining of Multi-Modal Social Networks at Different Abstraction Levels,2006.
  8. JunmeiWang, WynneHsu Mong and Li Lee Chang Sheng," "A Partition-Based Approach to Graph Mining", Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), IEEE 2006.
  9. Kamrul Abedin Tarafder, Shah Mostafa Khaled, mohammad Ashraful Islam," Reverse Apriori algorithm for frequent pattern mining", Medwell journals, 2008.
  10. Frank Eichinger, Klemens B¨ohm and Matthias Huber," Improved Software Fault Detection with Graph Mining", Appearing in the 6th International Workshop on Mining and Learning with Graphs, Helsinki, Finland, 2008.
  11. William Eberle: Detecting Insider Threats Using a Graph Based Approach, 2010.
  12. Anton Dries and Siegfried Nijseen: Analyzing graph database by aggregate queries, 2010.
  13. Polo Chau: Catching Bad Guys with Graph Mining,Springer, 2011.
  14. Ciro Cattuto, André Panisson, Marco Quaggiotto and Alex Averbuch,"Time-varying Social Networks in a Graph Database", 2012.
  15. G. Kishore Kumar, Dr. V. K. Jayaraman " Clustering of Complex Networks and Community Detection Using Group Search Optimization", 2012.
  16. Garima Jaiswal and Arun Prakash Agrawal "Comparative analysis of Relational and Graph databases", IOSR Journal of Engineering (IOSRJEN),2013.
  17. Quist-Aphetsi Kester,"Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data", IEEE 2013.
  18. Justin J. Miller,"Graph Database Applications and Concepts with Neo4j",Proceedings of the SouthernAssociation for Information Systems Conference, Atlanta, GA, USA March 23rd-24th, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Graph database Graph mining Common Node Sub graph.