SlideShare a Scribd company logo
1 of 4
Download to read offline
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 02 Issue: 01 June 2013 Page No.16-19
ISSN: 2278-2419
16
Fuzzy Clustering Approach to study the degree of
Aggressiveness in Youth Violence
A.Victor Devadoss1
, A. Felix2
Department of Mathematics, Loyola College, Chennai, Tamil Nadu, India
Email:afelixphd@gmail.com
Abstract-Youth violence is a global social problem. It includes
a range of deeds like bullying, physical fighting, severe sexual,
physical assault to homicide and various atrocities. A set
oftwenty risk factors of youth violence have been chosen,
which stimulate aggressive behavior in them. In this study,
theperception of youth is captured in a 10-pts rating scale
regarding the degree of variation in the level of aggressiveness
at the chosen risk factors of youth violence in Chennai. The
average rating scale is used to cluster the attributes using Fuzzy
c-means clustering and classify them as low, medium and high
level of aggressiveness and it can be classified proactively to
ensure violence that do not occur. The advantage of fuzzy
clustering is an attribute can be part of more than one cluster to
the varying degree and this gives a better picture about the risk
factors for youth violence.
Keywords –Clustering, C-means clustering, aggressive
behavior, and youth violence.
I. INTRODUCTION
Violence is a problem which affects our day today life in a
severe way. Even though human beings have been struggling
to create civilized societies for many years, they are not able to
get free from the influence of violence and aggression yet.
Aggressiveness among the youth is considered to be a global
public health problem in many parts of the world [4]. The
existence of violence around a person might provoke him to
behave in a more violent way. In the years 1990–2004, rates of
youth homicide have increased in many developing countries,
and declined in several developed countries. For every young
person killed by violence, 20–40 more sustain injuries that
require hospital treatment. Non-fatal violent injuries involve
substantially fewer firearm attacks than fatal assaults and
involve a greater use of fists, feet, knives and clubs.Youth
homicide and non-fatal violence not only contribute greatly to
the global burden of premature death, injury and disability, but
also have a serious, often lifelong, impact on a person's
psychological and social functioning. This can affect victims'
families, friends and communities. Youth violence adds greatly
to the costs of health, welfare and criminal justice services;
reduces productivity; decreases value of the property; and
generally undermines the fabric of society. So in this paper we
analyze the risk factors of youth violence and what makes them
more aggressive. It is qualitative in nature and is non-
measurable, yet observable. In order to quantify the degree of
risk factors of youth violence, interviewing and recording the
youth perception is an ideal method. This study aims to
capture the youth perception about the level of aggressiveness
at a set of risk factor of violence and then classify the attributes
based on fuzzy c-means clustering [2]. Fuzzy clustering is
more appropriate for perception based data since perceptions
are always a matter of varying degree. This paper is organized
as follows: In section two, methodology of our study. Basic
concepts and definitions of fuzzy clustering and C-means
clustering in section three. In section four, adaptations of the
problem and final section derives conclusion and suggestion
based on our study.
II. METHODOLOGY
The classification of risk factors of youth violence that
stimulate aggressive behavior in them is done based on youth
perception, the following twenty attributes of risk factor for
youth violence is chosen by interviewing the youth in Chennai.
 Impulsiveness.
 Poor behavioral control.
 Seeking recognition.
 Early involvement with alcohol, drugs and tobacco
 Antisocial beliefs and attitudes.
 Low intelligence and educational achievement.
 Low commitment to school and school failure.
 coming from a single-parent household
 Experiencing parental separation or divorce
 Exposure to violence in the family.
 Poor monitoring and supervision of children by parents
 Harsh, lax or inconsistent parental disciplinary practices
 Quality of a country’s governance (its laws and the
extent to which they are enforced, as well as policies for
education and social protection).
 Low parental involvement in children's activities
 Parental substance abuse or criminality
 Low family income.
 Associating with delinquent peers.
 A low level of attachment between parents and children.
 An absence of non-violent environment for resolving
conflicts.
 Hyperactivity.
III. PRELIMINARIES
A. Hard Clustering
In Hard Clustering we make a hard partition of the data set Z.
In other words, we divide them into c ≥ 2 clusters. With a
partition, we mean that
1
c
i
i
A Z

 and i jA A  ,  i j
(1)
Also, none of the sets, Ai may be empty. To indicate a
portioning, we make use of membership functions µk(x).
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 02 Issue: 01 June 2013 Page No.16-19
ISSN: 2278-2419
17
If µk(x) = 1, then object x is in cluster k. Based on the
membership functions, we can assemble the Partition Matrix
U, of which µk(x) are the elements. Finally there is a rule that
x
1
( ) 1
c
k
i
x

 (2)
In other words, every object is only part of one cluster.
B. Fuzzy clustering
When an object roughly falls between two clusters Ai and Aj, it
has to be put into one of these clusters. Also, boundary has to
be put in some cluster. This is undesirable. But it can be fixed
by fuzzy clustering.
In Fuzzy clustering, we make a Fuzzy partition of the data.
Now, the membership function µk(x) can be any value between
0 and 1. This means that an object zk can be for 0.2 parts in Ai
and for 0.8 part in Aj. However, requirement (2) still applies.
So, the sum of the membership functions still has to be 1. The
set of all fuzzy partitions that can be formed in this way is
denoted by Mfc. Fuzzy partitioning again has a downside.
When we have an outlier in the data (being an object that
doesn’t really belong to any cluster), we still have to assign it
to clusters. That is, the sum of its membership functions still
must equal one.
C. Fuzzy C-Means Clustering
In fuzzy clustering, each point has a degree of belonging to
clusters rather than belonging completely to just one cluster.
Thus, points on the edge of a cluster, may be in a cluster to a
lesser degree than points in the center of cluster for each point
x there is no coefficient giving the degree of being in the kth
cluster
µk(x) = 1. Usually, the sum of those coefficients is defined to
be 1.
x
.
1
( ) 1
num cluster
x
n
x

 (3)
with fuzzy c-means, the centroid of a cluster is the mean of all
points, weighted by their degree of belonging to the cluster
( )
( )
m
k
x
k m
k
x
x x
center
x





(4)
 The degree of belonging is related to the inverse of the
distance to the cluster Three attributes which best define
the characteristic of each segment have been selected to
be rated by respondents. Fuzzy clustering is done using
the algorithm,
1
( )
( , )'
k
k
x
d center x
  (5)
then the coefficients are normalized and fuzzy field with a real
parameter m> 1 so that their sum is 1. So
2/( 1)
1
( )
( , )
( , )
k m
k
j j
x
d center x
d center x
 

 
  
 

(6)
For m equal to 2, this is equivalent to normalizing the
coefficient linearly to make their sum 1. When m is close to 1,
then cluster center closes to the point is given much more
weight than the others, and the algorithm is similar to k-means.
IV. RESULT AND DISCUSSION
A survey on 100 youth has been taken in Chennai city to find
what stimulates aggressiveness in them. In this process twenty
attributes of risk factorshave been chosen and the respondents
had rated these attributes leads to high level aggressiveness on
a 10-point rating scale and the result on averageare shown in
Fig.1. 5th
and 14th
attributes are rated highest by the
respondents with an average rating of 9.2 and 9 respectively on
a 10-point scale. This means that, when we compare to other
attributes 5th
and 14th
leads to high levelaggressiveness and the
17th
attribute rating average 2.5 which leads to low level of
aggressiveness.
Fig.1 Mean rating of aggressive level at the risk factors of
youth violence.
The ratings and the Standard Deviation of aggressive level at
the attributes of risk factors of youth violence have been
subjected to fuzzy c-means clustering using the algorithm(1)
and the following results shown in Table :I have been obtained
for a 3-cluster combination. The first cluster comprises of the
attributes with average rating from 2.8 to 5.9 with a mid-value
4.35. The second cluster range is from 3.5 to 7.5 with a
midvalue 5.5 and the third cluster has a range of 6.5 to 10 with
a mid-value 8.25. The first cluster range indicates youth
violence, which engendered LOW level aggressiveness.
Second and third clusters range shows that MODERATE and
HIGH level of aggressiveness respectively. There is Over-
lapping ranges as in characteristic of a fuzzy based cluster.
Table: I 3-Cluster Range of Level of aggressiveness
0
1
2
3
4
5
6
7
8
9
10
1 3 5 7 9 11 13 15 17 19
risk factors of
youth violence
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 02 Issue: 01 June 2013 Page No.16-19
ISSN: 2278-2419
18
Algorithm To Find A Membership Values For The Attributes
Step: 1 Start
Step: 2 Fix, the mean values of 20 attributes on a 10-point
rating scale in a set D (say)
Step: 3 Fix the clusters, which is defined as Cluster 1 = LOW,
whose range beginning with 2.8 (bv1) end with 5.9 (ev1).
Cluster 2 = MODERATE, whose range beginning with 3.7
(bv2) end with 7.5(ev2). Cluster 3 = HIGH, whose range
beginning with 6.5 (bv3) end with 10 (ev3)
Step: 4 Choose an element x in D
Step: 5 If x < ev1, Go to Step: 6, else Go to Step: 8
Step: 6 If x > bv2, then x lies in cluster 1 and cluster 2 whose
membership value is defined as
µk(x) = ev1-x: x- bv2, Go to Step: 12, else Go to Step:
7.
Step: 7 x lies in cluster 1 only, the membership value is µk(x)
=1 Go to Step: 12
Step: 8 If x< ev2 Go to Step: 9, else Go to Step: 11
Step: 9 If x> bv3, then x lies in cluster 2 and cluster 3, whose
membership value is defined as
µk(x) = ev2-x: x-bv3, Go to step 12, else Go to Step:
10
Step: 10x lies in cluster 2 only, the membershipvalue is µk(x)
=1 else Go to Step: 11
Step: 11x lies in cluster 3 only, the membershipvalue is µk(x)
=1
Step: 12 Go to Step: 4, until all the values in Dhave to be
checked
Step: 13 Stop
Degree of membership of the attributes of risk factor of youth
violence is found using the above algorithm is shown in Table:
II. Attribute 17 with a mean rating 2.5 is entirely (100
percentage) with a membership value of 1 in cluster 1.
Attribute 1 belongs to 54 percent in cluster 1 and 46 percent in
cluster 2. This indicate that, when youth face this risk factor,
their aggressive level 54percentage to a low degree and 46
percentage to a moderate degree.
Similarly, at attribute 8 belongs 91 per cluster 2 and 9 per to
cluster 3. Based on Table II it can be identified that at
attributes 1 and 11 youth do not get HIGH level aggressive. At
the attributes 7 and 13 theiraggressive level will be
MODERATE and at the attributes 5, 14 and 20 their aggressive
level will be HIGH. All other attributes are not purely a
member of one cluster alone but are members of at-least two
clusters. Based onTable II the following attributes 1, 10, 11,
17 and 20 leads toLOW levels aggressive. A youth gets
MODERATE level of aggressiveness at the attributes 2, 4, 7,
8, 15, and 19. At the risk factors 5, 6, 9, 12, 14, 16 and 18 are
also member of cluster 3 with a High level of aggressiveness.
Table: II: Degree of Membership of the Attributes
V. CONCLUSION
In Crisp Clustering, where an attribute is a member of one
cluster only, the fuzzy clustering process permits an attribute to
be a member of more than one cluster although to a varying
degree. This helps us to find out themajor reasons for which
the youth get more aggressive. So from our study we conclude
that the youth get more aggressive from the risk factors such as
antisocial beliefs and attitudes, low parental involvement in
children's activities and a low level of attachment between
parents and children.
SUGGESTION
Parent – and family- based programs improve family relations.
Parents receive training on child development. They also learn
skills for talking with their kids and solving problems in
nonviolent way.Social-development strategies teach children
how to handle tough social situations. They learn how to
resolve problems without using violence.Mentoring programs
pair an adult with a young person. The adult serves as
appositive role model and helps guide the young person’s
behavior.
S.No. Mean LOW MODE
RATE
HIGH
1. 4.6 0.54 0.46 0
2. 5.61 0.12 0.88 0
3. 6.75 0 0.75 0.25
4. 5.8 0.04 0.96 0
5. 9.2 0 0 1
6. 7.3 0 0.2 0.8
7. 6.2 0 1 0
8. 5.68 0.1 0.9 0
9. 7.2 0 0.3 0.7
10. 4.56 0.56 0.44 0
11. 3.9 0.83 0.17 0
12. 7.35 0 0.15 0.85
13. 6.3 0 1 0
14. 9 0 0 1
15. 5.5 0.16 0.83 0
16. 7.21 0 0.29 0.71
17. 2.5 1 0 0
18. 7.8 0 0 1
19. 6.7 0 0.8 0.2
20. 5.1 0.8 0.2 0
Cluster 1 Cluster 2 Cluster
3
Range 2.8-5.9 3.5-7.5 6.5-10
Mid Value 4.35 5.5 8.25
Classificat
ion
LOW MODE
RATE
HIGH
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 02 Issue: 01 June 2013 Page No.16-19
ISSN: 2278-2419
19
REFERENCES
[1] A. Roy Lazar, “Religious praxis in Response to Violence”, Asian Trading
Corporation 2012.
[2] A. Victor Devadoss, A. Felix “Fuzzy Clustering of the domestic violence
for the degree of suicide thought based on married women perception”
International Journal of
[3] Engineering Research and Application ,volume 2, Issue 4, July 2012.
[4] Borum R.”Assessing violence risk among youth” J Clin Psychol 2000.
[5] Christopher J Ferguson, Clandia San Miguel and Richard D.Hartley “A
Multivariate of youth violence and Aggression: The influence of family,
Peers, Depression, and media violence” the journal of Pediatrics, 2009
[6] G. Gururaj “Injury and violence in India: Facts and Figures” National
Institute of Mental and Neuro Sciences, publication no 82.
[7] H.J. Zimmermann, “Fuzzy Set Theory and its application”, Fourth Edition
Springer 2011.
[8] John J.Vilson “Predictors of youth violence” OJJDP. April 2000.
[9] J. Klir George/Bo Yuan, “Fuzzy sets and Fuzzy Logic : Theory and
Applications”, Prentice Hall of India.
[10]J. Gunter, “Intimate Partner Violence”. Obset Gynecol Clin North Am;
34:367-88.2007
[11]J.Kishore, A.Singh, Indu Grewal, Sushma R.Singh and K.Roy “Risk
behavior in an urban and rural male adolescent population” National
Medical Journal of India Vol 12 No3 Pg 107-110 1997.
[12]Herrenkohl TI, Maguin E “Development of risk factors for youth
violence.” J Adolesc Health 2000.

More Related Content

Similar to Fuzzy Clustering Approach to study the degree of Aggressiveness in Youth Violence

MMG 404 FS16 NAME_____________________Homework #822 p.docx
MMG 404 FS16 NAME_____________________Homework #822 p.docxMMG 404 FS16 NAME_____________________Homework #822 p.docx
MMG 404 FS16 NAME_____________________Homework #822 p.docx
raju957290
 
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docxSYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
perryk1
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ssusera34210
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
rossskuddershamus
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
festockton
 
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsC
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsCFilm Analysis Midterm Question--minimum 1000 to max 1200 wordsC
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsC
ChereCheek752
 
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docxMATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
wkyra78
 
Definition and measurement of cyberbullying
Definition and measurement of cyberbullyingDefinition and measurement of cyberbullying
Definition and measurement of cyberbullying
Marcelo Pesallaccia
 
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docxDiscussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
duketjoy27252
 

Similar to Fuzzy Clustering Approach to study the degree of Aggressiveness in Youth Violence (20)

Evaluation measures for models assessment over imbalanced data sets
Evaluation measures for models assessment over imbalanced data setsEvaluation measures for models assessment over imbalanced data sets
Evaluation measures for models assessment over imbalanced data sets
 
Publication
PublicationPublication
Publication
 
11 - Chapter 4 (Mogote).docx
11 -  Chapter 4 (Mogote).docx11 -  Chapter 4 (Mogote).docx
11 - Chapter 4 (Mogote).docx
 
A_Partial_Least_Squares_Latent_Variable_Modeling_A.pdf
A_Partial_Least_Squares_Latent_Variable_Modeling_A.pdfA_Partial_Least_Squares_Latent_Variable_Modeling_A.pdf
A_Partial_Least_Squares_Latent_Variable_Modeling_A.pdf
 
MMG 404 FS16 NAME_____________________Homework #822 p.docx
MMG 404 FS16 NAME_____________________Homework #822 p.docxMMG 404 FS16 NAME_____________________Homework #822 p.docx
MMG 404 FS16 NAME_____________________Homework #822 p.docx
 
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docxSYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
SYSTEMATIC REVIEWElder abuse a systematic review of risk .docx
 
Determining the influence of transition or community based interventions
Determining the influence of transition or community based interventionsDetermining the influence of transition or community based interventions
Determining the influence of transition or community based interventions
 
The effect of social welfare
The effect of social welfareThe effect of social welfare
The effect of social welfare
 
The Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex NetworkThe Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex Network
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
 
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docxArticleSex Offender Recidivism Revisited Review ofRecen.docx
ArticleSex Offender Recidivism Revisited Review ofRecen.docx
 
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsC
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsCFilm Analysis Midterm Question--minimum 1000 to max 1200 wordsC
Film Analysis Midterm Question--minimum 1000 to max 1200 wordsC
 
Abstract
AbstractAbstract
Abstract
 
Extended systematic clustering: Microdata protection by distributing semsitiv...
Extended systematic clustering: Microdata protection by distributing semsitiv...Extended systematic clustering: Microdata protection by distributing semsitiv...
Extended systematic clustering: Microdata protection by distributing semsitiv...
 
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docxMATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
MATH 130 (Precalculus) Spring 2020Exam 3 Thursday, May 7.docx
 
Definition and measurement of cyberbullying
Definition and measurement of cyberbullyingDefinition and measurement of cyberbullying
Definition and measurement of cyberbullying
 
20142014_20142015_20142115
20142014_20142015_2014211520142014_20142015_20142115
20142014_20142015_20142115
 
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docxDiscussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
 
Scalable
ScalableScalable
Scalable
 

More from ijdmtaiir

Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
ijdmtaiir
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
ijdmtaiir
 

More from ijdmtaiir (20)

A review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic AnalysisA review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic Analysis
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Mining
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
 
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
 
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities MarketAn Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
 
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
 
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
 
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
 
Certain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic DataminingCertain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic Datamining
 
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
 
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
 
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic RetinopathyAn Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
 
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
 
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
 
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 

Fuzzy Clustering Approach to study the degree of Aggressiveness in Youth Violence

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 02 Issue: 01 June 2013 Page No.16-19 ISSN: 2278-2419 16 Fuzzy Clustering Approach to study the degree of Aggressiveness in Youth Violence A.Victor Devadoss1 , A. Felix2 Department of Mathematics, Loyola College, Chennai, Tamil Nadu, India Email:afelixphd@gmail.com Abstract-Youth violence is a global social problem. It includes a range of deeds like bullying, physical fighting, severe sexual, physical assault to homicide and various atrocities. A set oftwenty risk factors of youth violence have been chosen, which stimulate aggressive behavior in them. In this study, theperception of youth is captured in a 10-pts rating scale regarding the degree of variation in the level of aggressiveness at the chosen risk factors of youth violence in Chennai. The average rating scale is used to cluster the attributes using Fuzzy c-means clustering and classify them as low, medium and high level of aggressiveness and it can be classified proactively to ensure violence that do not occur. The advantage of fuzzy clustering is an attribute can be part of more than one cluster to the varying degree and this gives a better picture about the risk factors for youth violence. Keywords –Clustering, C-means clustering, aggressive behavior, and youth violence. I. INTRODUCTION Violence is a problem which affects our day today life in a severe way. Even though human beings have been struggling to create civilized societies for many years, they are not able to get free from the influence of violence and aggression yet. Aggressiveness among the youth is considered to be a global public health problem in many parts of the world [4]. The existence of violence around a person might provoke him to behave in a more violent way. In the years 1990–2004, rates of youth homicide have increased in many developing countries, and declined in several developed countries. For every young person killed by violence, 20–40 more sustain injuries that require hospital treatment. Non-fatal violent injuries involve substantially fewer firearm attacks than fatal assaults and involve a greater use of fists, feet, knives and clubs.Youth homicide and non-fatal violence not only contribute greatly to the global burden of premature death, injury and disability, but also have a serious, often lifelong, impact on a person's psychological and social functioning. This can affect victims' families, friends and communities. Youth violence adds greatly to the costs of health, welfare and criminal justice services; reduces productivity; decreases value of the property; and generally undermines the fabric of society. So in this paper we analyze the risk factors of youth violence and what makes them more aggressive. It is qualitative in nature and is non- measurable, yet observable. In order to quantify the degree of risk factors of youth violence, interviewing and recording the youth perception is an ideal method. This study aims to capture the youth perception about the level of aggressiveness at a set of risk factor of violence and then classify the attributes based on fuzzy c-means clustering [2]. Fuzzy clustering is more appropriate for perception based data since perceptions are always a matter of varying degree. This paper is organized as follows: In section two, methodology of our study. Basic concepts and definitions of fuzzy clustering and C-means clustering in section three. In section four, adaptations of the problem and final section derives conclusion and suggestion based on our study. II. METHODOLOGY The classification of risk factors of youth violence that stimulate aggressive behavior in them is done based on youth perception, the following twenty attributes of risk factor for youth violence is chosen by interviewing the youth in Chennai.  Impulsiveness.  Poor behavioral control.  Seeking recognition.  Early involvement with alcohol, drugs and tobacco  Antisocial beliefs and attitudes.  Low intelligence and educational achievement.  Low commitment to school and school failure.  coming from a single-parent household  Experiencing parental separation or divorce  Exposure to violence in the family.  Poor monitoring and supervision of children by parents  Harsh, lax or inconsistent parental disciplinary practices  Quality of a country’s governance (its laws and the extent to which they are enforced, as well as policies for education and social protection).  Low parental involvement in children's activities  Parental substance abuse or criminality  Low family income.  Associating with delinquent peers.  A low level of attachment between parents and children.  An absence of non-violent environment for resolving conflicts.  Hyperactivity. III. PRELIMINARIES A. Hard Clustering In Hard Clustering we make a hard partition of the data set Z. In other words, we divide them into c ≥ 2 clusters. With a partition, we mean that 1 c i i A Z   and i jA A  ,  i j (1) Also, none of the sets, Ai may be empty. To indicate a portioning, we make use of membership functions µk(x).
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 02 Issue: 01 June 2013 Page No.16-19 ISSN: 2278-2419 17 If µk(x) = 1, then object x is in cluster k. Based on the membership functions, we can assemble the Partition Matrix U, of which µk(x) are the elements. Finally there is a rule that x 1 ( ) 1 c k i x   (2) In other words, every object is only part of one cluster. B. Fuzzy clustering When an object roughly falls between two clusters Ai and Aj, it has to be put into one of these clusters. Also, boundary has to be put in some cluster. This is undesirable. But it can be fixed by fuzzy clustering. In Fuzzy clustering, we make a Fuzzy partition of the data. Now, the membership function µk(x) can be any value between 0 and 1. This means that an object zk can be for 0.2 parts in Ai and for 0.8 part in Aj. However, requirement (2) still applies. So, the sum of the membership functions still has to be 1. The set of all fuzzy partitions that can be formed in this way is denoted by Mfc. Fuzzy partitioning again has a downside. When we have an outlier in the data (being an object that doesn’t really belong to any cluster), we still have to assign it to clusters. That is, the sum of its membership functions still must equal one. C. Fuzzy C-Means Clustering In fuzzy clustering, each point has a degree of belonging to clusters rather than belonging completely to just one cluster. Thus, points on the edge of a cluster, may be in a cluster to a lesser degree than points in the center of cluster for each point x there is no coefficient giving the degree of being in the kth cluster µk(x) = 1. Usually, the sum of those coefficients is defined to be 1. x . 1 ( ) 1 num cluster x n x   (3) with fuzzy c-means, the centroid of a cluster is the mean of all points, weighted by their degree of belonging to the cluster ( ) ( ) m k x k m k x x x center x      (4)  The degree of belonging is related to the inverse of the distance to the cluster Three attributes which best define the characteristic of each segment have been selected to be rated by respondents. Fuzzy clustering is done using the algorithm, 1 ( ) ( , )' k k x d center x   (5) then the coefficients are normalized and fuzzy field with a real parameter m> 1 so that their sum is 1. So 2/( 1) 1 ( ) ( , ) ( , ) k m k j j x d center x d center x            (6) For m equal to 2, this is equivalent to normalizing the coefficient linearly to make their sum 1. When m is close to 1, then cluster center closes to the point is given much more weight than the others, and the algorithm is similar to k-means. IV. RESULT AND DISCUSSION A survey on 100 youth has been taken in Chennai city to find what stimulates aggressiveness in them. In this process twenty attributes of risk factorshave been chosen and the respondents had rated these attributes leads to high level aggressiveness on a 10-point rating scale and the result on averageare shown in Fig.1. 5th and 14th attributes are rated highest by the respondents with an average rating of 9.2 and 9 respectively on a 10-point scale. This means that, when we compare to other attributes 5th and 14th leads to high levelaggressiveness and the 17th attribute rating average 2.5 which leads to low level of aggressiveness. Fig.1 Mean rating of aggressive level at the risk factors of youth violence. The ratings and the Standard Deviation of aggressive level at the attributes of risk factors of youth violence have been subjected to fuzzy c-means clustering using the algorithm(1) and the following results shown in Table :I have been obtained for a 3-cluster combination. The first cluster comprises of the attributes with average rating from 2.8 to 5.9 with a mid-value 4.35. The second cluster range is from 3.5 to 7.5 with a midvalue 5.5 and the third cluster has a range of 6.5 to 10 with a mid-value 8.25. The first cluster range indicates youth violence, which engendered LOW level aggressiveness. Second and third clusters range shows that MODERATE and HIGH level of aggressiveness respectively. There is Over- lapping ranges as in characteristic of a fuzzy based cluster. Table: I 3-Cluster Range of Level of aggressiveness 0 1 2 3 4 5 6 7 8 9 10 1 3 5 7 9 11 13 15 17 19 risk factors of youth violence
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 02 Issue: 01 June 2013 Page No.16-19 ISSN: 2278-2419 18 Algorithm To Find A Membership Values For The Attributes Step: 1 Start Step: 2 Fix, the mean values of 20 attributes on a 10-point rating scale in a set D (say) Step: 3 Fix the clusters, which is defined as Cluster 1 = LOW, whose range beginning with 2.8 (bv1) end with 5.9 (ev1). Cluster 2 = MODERATE, whose range beginning with 3.7 (bv2) end with 7.5(ev2). Cluster 3 = HIGH, whose range beginning with 6.5 (bv3) end with 10 (ev3) Step: 4 Choose an element x in D Step: 5 If x < ev1, Go to Step: 6, else Go to Step: 8 Step: 6 If x > bv2, then x lies in cluster 1 and cluster 2 whose membership value is defined as µk(x) = ev1-x: x- bv2, Go to Step: 12, else Go to Step: 7. Step: 7 x lies in cluster 1 only, the membership value is µk(x) =1 Go to Step: 12 Step: 8 If x< ev2 Go to Step: 9, else Go to Step: 11 Step: 9 If x> bv3, then x lies in cluster 2 and cluster 3, whose membership value is defined as µk(x) = ev2-x: x-bv3, Go to step 12, else Go to Step: 10 Step: 10x lies in cluster 2 only, the membershipvalue is µk(x) =1 else Go to Step: 11 Step: 11x lies in cluster 3 only, the membershipvalue is µk(x) =1 Step: 12 Go to Step: 4, until all the values in Dhave to be checked Step: 13 Stop Degree of membership of the attributes of risk factor of youth violence is found using the above algorithm is shown in Table: II. Attribute 17 with a mean rating 2.5 is entirely (100 percentage) with a membership value of 1 in cluster 1. Attribute 1 belongs to 54 percent in cluster 1 and 46 percent in cluster 2. This indicate that, when youth face this risk factor, their aggressive level 54percentage to a low degree and 46 percentage to a moderate degree. Similarly, at attribute 8 belongs 91 per cluster 2 and 9 per to cluster 3. Based on Table II it can be identified that at attributes 1 and 11 youth do not get HIGH level aggressive. At the attributes 7 and 13 theiraggressive level will be MODERATE and at the attributes 5, 14 and 20 their aggressive level will be HIGH. All other attributes are not purely a member of one cluster alone but are members of at-least two clusters. Based onTable II the following attributes 1, 10, 11, 17 and 20 leads toLOW levels aggressive. A youth gets MODERATE level of aggressiveness at the attributes 2, 4, 7, 8, 15, and 19. At the risk factors 5, 6, 9, 12, 14, 16 and 18 are also member of cluster 3 with a High level of aggressiveness. Table: II: Degree of Membership of the Attributes V. CONCLUSION In Crisp Clustering, where an attribute is a member of one cluster only, the fuzzy clustering process permits an attribute to be a member of more than one cluster although to a varying degree. This helps us to find out themajor reasons for which the youth get more aggressive. So from our study we conclude that the youth get more aggressive from the risk factors such as antisocial beliefs and attitudes, low parental involvement in children's activities and a low level of attachment between parents and children. SUGGESTION Parent – and family- based programs improve family relations. Parents receive training on child development. They also learn skills for talking with their kids and solving problems in nonviolent way.Social-development strategies teach children how to handle tough social situations. They learn how to resolve problems without using violence.Mentoring programs pair an adult with a young person. The adult serves as appositive role model and helps guide the young person’s behavior. S.No. Mean LOW MODE RATE HIGH 1. 4.6 0.54 0.46 0 2. 5.61 0.12 0.88 0 3. 6.75 0 0.75 0.25 4. 5.8 0.04 0.96 0 5. 9.2 0 0 1 6. 7.3 0 0.2 0.8 7. 6.2 0 1 0 8. 5.68 0.1 0.9 0 9. 7.2 0 0.3 0.7 10. 4.56 0.56 0.44 0 11. 3.9 0.83 0.17 0 12. 7.35 0 0.15 0.85 13. 6.3 0 1 0 14. 9 0 0 1 15. 5.5 0.16 0.83 0 16. 7.21 0 0.29 0.71 17. 2.5 1 0 0 18. 7.8 0 0 1 19. 6.7 0 0.8 0.2 20. 5.1 0.8 0.2 0 Cluster 1 Cluster 2 Cluster 3 Range 2.8-5.9 3.5-7.5 6.5-10 Mid Value 4.35 5.5 8.25 Classificat ion LOW MODE RATE HIGH
  • 4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 02 Issue: 01 June 2013 Page No.16-19 ISSN: 2278-2419 19 REFERENCES [1] A. Roy Lazar, “Religious praxis in Response to Violence”, Asian Trading Corporation 2012. [2] A. Victor Devadoss, A. Felix “Fuzzy Clustering of the domestic violence for the degree of suicide thought based on married women perception” International Journal of [3] Engineering Research and Application ,volume 2, Issue 4, July 2012. [4] Borum R.”Assessing violence risk among youth” J Clin Psychol 2000. [5] Christopher J Ferguson, Clandia San Miguel and Richard D.Hartley “A Multivariate of youth violence and Aggression: The influence of family, Peers, Depression, and media violence” the journal of Pediatrics, 2009 [6] G. Gururaj “Injury and violence in India: Facts and Figures” National Institute of Mental and Neuro Sciences, publication no 82. [7] H.J. Zimmermann, “Fuzzy Set Theory and its application”, Fourth Edition Springer 2011. [8] John J.Vilson “Predictors of youth violence” OJJDP. April 2000. [9] J. Klir George/Bo Yuan, “Fuzzy sets and Fuzzy Logic : Theory and Applications”, Prentice Hall of India. [10]J. Gunter, “Intimate Partner Violence”. Obset Gynecol Clin North Am; 34:367-88.2007 [11]J.Kishore, A.Singh, Indu Grewal, Sushma R.Singh and K.Roy “Risk behavior in an urban and rural male adolescent population” National Medical Journal of India Vol 12 No3 Pg 107-110 1997. [12]Herrenkohl TI, Maguin E “Development of risk factors for youth violence.” J Adolesc Health 2000.