SlideShare a Scribd company logo
1 of 6
Download to read offline
Automatic Crime Report Classiļ¬cation through
a Weightless Neural Network
Rafael Adnet Pinho, Walkir A. T. Brito, Claudia L. R. Motta
and Priscila Vieira Lima
Federal University of Rio de Janeiro (UFRJ)
Pos-Graduation Program in Informatics (PPGI), Rio de Janeiro, RJ - Brazil
(rafaadnet, walkir.brito)@gmail.com, (claudiam, priscila.lima)@nce.ufrj.br
Abstract. Anonymous crime reporting is a tool that helps to reduce
and prevent crime occurrences. The classiļ¬cation of the crime reports re-
ceived by the call center is necessary for the data organization and also to
stipulate the importance of a particular report and its relation to others.
The objective of this work is to develop a system that assists the call cen-
terā€™s operator by recommending classiļ¬cation to new reports. The system
uses a weightless neural network that automatically attribute a class to
a report. At the end of this work it was possible to observe that auto-
matic classiļ¬cations of crime reports with high accuracy are possible using
a weightless neural network.
1 Introduction
The Brazilian state of Rio de Janeiro receives more than 100,000 anonymous
crime reports each year through the main crime report call center named Disque
Denuncia, this is a program pretty similar to the American Crime Stoppers. The
information of those crime reports is extremely important to reduce crime levels
by helping the police and other authorities to realize more eļ¬ƒcient operations
against criminals.
Such important data is constantly analyzed and thousand of studies and re-
sults are derived from it. However, all the reports are still been classiļ¬ed only
by the call centerā€™s operators without any help of computer intelligence, leaving
space for classiļ¬cations mistakes. The text classiļ¬cation is a process of label-
ing text documents into one or more pre-speciļ¬ed categories. Due to the vast
majority of web pages, emails, social networking information, and even corpo-
rate information that is available in digital form, automatic text classiļ¬cation
has gained attention in many research domains. For example, it has been used
to categorize newspaper articles into topics [1], and classify network intrusion
attacks as Positive and Negative [2]. Current classiļ¬cation methods such as
decision trees, k-nearest neighbors, neural networks, support vector machines,
and NaĀØıve Bayes have been successfully used in automated text classiļ¬cation.
However, most similarity algorithms are not specially developed to compare and
contrast crime reports, but general text reports. In addition, none of them, has
used Weightless Neural Networks to perform this type of classiļ¬cation.
This work intends to improve the task of crime report classiļ¬cation by de-
veloping a Automatic Crime Report Classiļ¬er(ACRC) that uses computational
intelligence in the reportā€™s text to assist the human classiļ¬cation process making
165
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.
it more assertive. The automatic classiļ¬cation process was made using Weight-
less Neural Networks, trained with texts of real crime reports.
The results of this paper show that machine learning techniques such as
Weightless Neural Networks can be very eļ¬ƒcient on ļ¬nding crime reports text
similarities and consequently to the reportā€™s classiļ¬cation.
The remainder of this text is organized as follows: Section 2 explains the
fundamental knowledge to understand the paper, Section 3 describes the dataset
used and the built system, Section 4 presents the system results and Section 5
concludes this article and points at further research topics.
2 Fundamentals
Itā€™s essential to understand how the crime reports structure is divided. As il-
lustrated by the ļ¬gure 1 the crime report has three fundamental parts, ā€Report
Descriptionā€, ā€Main Classiļ¬cationā€ and ā€Secondary Classiļ¬cationsā€.
Fig. 1: Report Structure.
The Report Description is the denounce received by the call-center typed
in natural language text by the operator, often describing the scene that was
observed by the denunciator in which it is believed that a delict was being
committed. The Main Classiļ¬cation deļ¬nes what is the principal delict by
the operatorā€™s perspective. The last part is the Secondary Classiļ¬cation. This
characteristic of the report structure makes possible to assign other classiļ¬cations
to the report that were observed on the Report Description. The Secondary
Classiļ¬cation is really important because it can determinate what authorities
needs to be involved, it can change the importance of the report and help to
determinate what kind of action needs to be take. To make the reportā€™s text
usable to computers some natural language processing (NLP) techniques were
used.
NLP is a ļ¬eld that intersects with artiļ¬cial intelligence and linguistics. NLP
techniques are frequently used to explore how computers can process and un-
derstand natural language text or speech. Generally, any system that uses NLP
includes tasks such as tokenization, sentence splitting, phrase segmentation and
information extraction [3]. The ļ¬rst three tasks are low-level tasks used to iden-
tify words, phrases, and sentences (described in the subsection 3.1), while the
166
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.
last task is a high-level task used to extract relevant information in a domain.
As a large training dataset was available for this work, the information extrac-
tion was based on a neural network approach, using a weightless neural network
(WNN) called WiSARD. Among all WNN, the WiSARD was chosen because itā€™s
the most representative model and it was the ļ¬rst to be produced as a machine
for a commercial propose [4]. WiSARD is an acronym of Wilkie, Stonham and
Alksanderā€™s Recognition Device, that is a weightless and multi-discriminator net-
work that was originally used for image recognition [4]. In brief, the WiSARD
is online (the training is not strictly separated from the recognition and they
can alternate), parallelizable (itā€™s possible to train diļ¬€erent patterns at the same
time, as long as they are diļ¬€erent) and fast training neural model (it is possible
to train it on a single round).
The WiSARD has been widely used in many applications for patterns recog-
nition such as HIV-1 sub-types categorization [5], music real-time tracking [6]
and credit analysis [7]. It works creating random relations on the original data
and them checking its existence during the training and recognition phases. Ev-
ery new pattern presented to the WiSARD is represented as a discriminator that
has a set of RAMs. The function of the RAMs is to store what are the random
relations that were seen during the training phase and to respond if a speciļ¬c
relation exists during the recognition phase. A discriminator is a structure that
is basically responsible for the recognition of a single class among all others
available classes. Each class has a maximum of 2n
neurons (or RAMs) where n
is the number of bits that each of the neurons will have. The weightless neuron,
or RAM, is a tuple <Address, Boolean> that ļ¬‚ags if a speciļ¬c part of a pattern
was seen by the discriminator.
3 Methodology
3.1 Dataset and Text Processing
The dataset used in the experiments of this paper is a real dataset made of crime
reports collected by Disque Denuncia during the year of 2015. It has 107,226
reports, each one with a text description, a main classiļ¬cation and zero or more
secondary classiļ¬cations. All addresses and sensitive information were hidden
for security reasons.
Many techniques were used to treat the texts of the reports before using the
WiSARD classiļ¬er. Basically ļ¬ve tasks were applied to the text of the reports:
tokenizer, normalization, stopwords removal, sentence splitter and stemmer. The
tokenization phase segments the text into individual tokens such as words and
punctuation. The stemmer identiļ¬es the main part of tokens. For example,
the stem of ā€™sellingā€™ and ā€™salesā€™ is ā€™saleā€™. The stopwords removal is a process to
remove words that are not relevant to the similarity measure between diļ¬€erent
texts, such as ā€™aā€™, ā€™anā€™ and ā€™theā€™, it also removes duplicated entities and keeps
relevant entities. Some speciļ¬c words were manually added to the stopwords
list because they appeared in the majority of the reports texts making them
irrelevant for the text classiļ¬cation, for example, the word ā€™streetā€™ that appears
167
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.
in 87% of the reports.
3.2 ACRC system
Fig. 2: ACRC system.
The Automatic Crime Report Classiļ¬er system is divided into three basic
layers as shown by ļ¬gure 2. The Text Processing layer is where all the texts
are treated. The technical details of this process are described in section 3.1.
On the WiSARD Training layer, a part of the crime reports are used to train
the WiSARD with diļ¬€erent types of crime classiļ¬cations. The last layer is the
WiSARD Classiļ¬cation where all other reports that were not used in the training
step are submitted to the system classiļ¬cation through the trained WiSARD
network. The ACRC code is available online [8] and all the details about the
experiment are explained in the following section.
4 Experimental results
The ļ¬rst part of the experiment consisted of the selection of classes to be used
since the 20 biggest classes contain 91% of all reports, they were the selected
classes to be used. The counting of those classes can be found at table 1. On
the experiment the k-fold cross-validation [9] was used with a k value of 10.
After the text-processing of all training reports, it was made a matrix that
each line was a report, and each column represented a speciļ¬c word from the
whole group of unique words present in all training reports, in other words, each
cell of the matrix represents the number of times that a word appears in a report.
The PyWANN [10] was the WiSARD implementation used, itā€™s an open
source stable version of the WiSARD developed in Python for general use. The
WiSARD has been conļ¬gure with 8 RAMs, each one using 3 bits of memory ad-
dressing. The Bleaching technique was used to overcome the saturation problem
of the WiSARD [11]. With Bleaching, instead to mark if a certain part of the
class pattern was observed or not, it counts how many times it was observed,
a threshold value is set to determinate if the speciļ¬c part of the pattern that
is been analyzed will be used or not. The Bleaching is generally a dynamic
threshold mechanism but in this experiment was used a simpler and easy-to-use
version of the Bleaching calibrated with a ļ¬xed threshold value of 3.
As mentioned, 10% of each class reports were used to check the accuracy of
the trained WiSARD. All text of the test reports were also treated by the same
168
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.
Classiļ¬cation
Number of
Reports
Accuracy
(%)
Drug Dealing 37261 64%
Noise 8908 80%
Ilegal use of public service 5555 95%
Animal abuse 4319 91%
Extortion 3982 63%
Ilegal handgun possession 3756 72%
Abandoned Vehicles 3345 70%
Fraud 3216 63%
Pedestrian theft 3091 59%
Outlaw location 2651 79%
Drug use 2624 38%
Ilegal gambling 2569 74%
Violence against the elderly 2549 76%
Mistreatment 2460 45%
Store without license 2411 56%
Murder 1858 58%
Closure of public roads 1846 74%
Theft of automotive vehicles 1808 87%
Violence against women 1795 75%
Badern 1517 31%
Table 1: Classiļ¬cation Results
text-processing techniques described in section 3.1. Then the test reports were
submitted to the trained WiSARD classiļ¬cation and one class was attributed by
the WiSARD for each of the reports. Then the attributed class was compared
with the classiļ¬cations that were manually attributed by humans of the Disque
Denuncia, considered the correct ones. The results detailed in table 1 shows
that only 3 classes (Drug use, Mistreatment, Badern) had a correct classiļ¬cation
rate (accuracy) below 50%. That is a comprehensive result since those classes
content are related to others, for instance, on a logical thought is hard to imagine
a ā€Violence against womanā€ scenario without the woman been mistreated. The
same thought applies to other relations such as ā€Drug useā€ related to ā€Drug
Dealingā€ and ā€Badernā€ related to ā€Noiseā€.
The training set had a mean (Āµ) of 0.674, a standard deviation (Ļƒ) of 0.167
and a coeļ¬ƒcient of variation (CV) of 0.25. Meaning that 75% of the results are
concentrated around the mean (Āµ).
5 Conclusions
The experiments showed that weightless neural networks like the WiSARD can
contribute to the classiļ¬cation of crime reports. Nevertheless, is recommended
the use of this approach as an auxiliary process to improve the human classiļ¬ca-
tion, helping the call-center operator to classify the crime reports by reminding
169
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.
them of a possible secondary classiļ¬cation that was not observed.
A limitation to this work was identiļ¬ed since the system might occasionally
classify two reports describing diļ¬€erent crimes as the same crime due to a high
similarity of the text. This is because there is always some overlap in reports, e.g.,
a report of a murder that 90% of the text is used to describe the murder threat
and only 10% to describe the actual murder, will be probably wrongly classiļ¬ed
as ā€Murder Threatā€. More advanced text mining and classiļ¬cation techniques
may be helpful in making the distinction between the diļ¬€erent crimes. Also,
the ACRC system is hard to conļ¬gure and complex to use by people that are
not familiar with Python code language. To make the system more practical
and useful to law enforcement agencies, it must have an easy and user-friendly
interface for interaction, this is part of a larger ongoing project.
In the future, we plan to try more diļ¬€erent combinations on the ļ¬ne-tune
of the WiSARD and compare the WiSARD accuracy and performance to other
machine learning methods from the state-of-art (e.g. decision trees). Future
works also include the use of the addresses of the reports inside the reportā€™s
description, in order to improve the classiļ¬cation accuracy by making the re-
ports localization an impact factor for the classiļ¬cation and police statistical
demographic analysis.
References
[1] G Mamakis, A G Malamos, and J A Ware. An alternative approach for statistical single-
label document classiļ¬cation of newspaper articles. Journal of Information Science, page
0165551511403543, 2011.
[2] D C Wyld. Rubee: applying low-frequency technology for retail and medical uses. Man-
agement Research News, 31(7):549ā€“554, 2008.
[3] X Wang, L Zhang, T Xie, J Anvik, and J Sun. An approach to detecting duplicate bug
reports using natural language and execution information. In Proceedings of the 30th
international conference on Software engineering, pages 461ā€“470. ACM, 2008.
[4] I. Aleksander, W.V. Thomas, and P.A. Bowden. Wisard: a radical step forward in image
recognition. Sensor Review, 4(3):120ā€“124, 1984.
[5] C Souza, F Nobre, P M V Lima, R Silva, R Brindeiro, and F M G FranĀøca. Recognition of
hiv-1 subtypes and antiretroviral drug resistance using weightless neural networks. 2012.
[6] D F P De Souza, F M G Franca, and P M V Lima. Real-time music tracking based on a
weightless neural network. pages 64ā€“69, 2015.
[7] D de O Cardoso, D S Carvalho, D S F Alves, D F P de Souza, H C C Carneiro, C E
Pedreira, P M V Lima, and F M G FranĀøca. Credit analysis with a clustering ram-based
neural classiļ¬er. In ESANN, 2014.
[8] R Adnet Pinho. Acrc system, www.github.com/radnet/acrc, 2016.
[9] P Refaeilzadeh, L Tang, and H Liu. Cross-validation. In Encyclopedia of database systems,
pages 532ā€“538. Springer, 2009.
[10] F Firmino. Pywann, www.github.com/ļ¬rmino/pywann, 2016.
[11] D S Carvalho, H C C Carneiro, F M G FranĀøca, and P M V Lima. B-bleaching: Agile
overtraining avoidance in the wisard weightless neural classiļ¬er. 2013.
170
ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence
and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1.
Available from http://www.i6doc.com/en/.

More Related Content

What's hot

A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
Ā 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
Ā 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
Ā 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Journals
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Publishing House
Ā 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSIJCNCJournal
Ā 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
Ā 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...ijwscjournal
Ā 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
Ā 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
Ā 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
Ā 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Ā 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
Ā 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
Ā 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
Ā 

What's hot (18)

A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
Ā 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
Ā 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Ā 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
Ā 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
Ā 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Ā 
J1802035460
J1802035460J1802035460
J1802035460
Ā 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
Ā 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
Ā 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Ā 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
Ā 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
Ā 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Ā 
1762 1765
1762 17651762 1765
1762 1765
Ā 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
Ā 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
Ā 

Similar to Automatic crime report classification through a weightless neural network

IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET Journal
Ā 
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...IRJET Journal
Ā 
36x48_new_modelling_cloud_infrastructure
36x48_new_modelling_cloud_infrastructure36x48_new_modelling_cloud_infrastructure
36x48_new_modelling_cloud_infrastructureWashington Garcia
Ā 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
Ā 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
Ā 
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningA Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningBRNSSPublicationHubI
Ā 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
Ā 
C0413016018
C0413016018C0413016018
C0413016018ijceronline
Ā 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
Ā 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
Ā 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
Ā 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
Ā 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEIRJET Journal
Ā 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
Ā 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
Ā 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
Ā 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
Ā 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSijseajournal
Ā 
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesFeature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesIRJET Journal
Ā 

Similar to Automatic crime report classification through a weightless neural network (20)

IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
Ā 
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
Ā 
36x48_new_modelling_cloud_infrastructure
36x48_new_modelling_cloud_infrastructure36x48_new_modelling_cloud_infrastructure
36x48_new_modelling_cloud_infrastructure
Ā 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
Ā 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
Ā 
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid ReasoningA Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
A Review on Reasoning System, Types, and Tools and Need for Hybrid Reasoning
Ā 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
Ā 
C0413016018
C0413016018C0413016018
C0413016018
Ā 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
Ā 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Ā 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Ā 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
Ā 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
Ā 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
Ā 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
Ā 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
Ā 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
Ā 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
Ā 
V01 i010414
V01 i010414V01 i010414
V01 i010414
Ā 
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesFeature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Ā 

Recently uploaded

Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangaloreamitlee9823
Ā 
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night StandCall Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Standamitlee9823
Ā 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
Ā 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
Ā 
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...only4webmaster01
Ā 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsJoseMangaJr1
Ā 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
Ā 
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort Service
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort ServiceBDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort Service
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort ServiceDelhi Call girls
Ā 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
Ā 
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...amitlee9823
Ā 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
Ā 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Pooja Nehwal
Ā 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
Ā 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
Ā 
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night StandCall Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Standamitlee9823
Ā 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
Ā 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
Ā 

Recently uploaded (20)

(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
Ā 
Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Begur Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Ā 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
Ā 
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night StandCall Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Bellandur ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Ā 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Ā 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
Ā 
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...
Call Girls Indiranagar Just Call šŸ‘— 9155563397 šŸ‘— Top Class Call Girl Service B...
Ā 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
Ā 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
Ā 
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort Service
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort ServiceBDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort Service
BDSMāš”Call Girls in Mandawali Delhi >ą¼’8448380779 Escort Service
Ā 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Ā 
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Ser...
Ā 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
Ā 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Ā 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Ā 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Ā 
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night StandCall Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Call Girls In Attibele ā˜Ž 7737669865 šŸ„µ Book Your One night Stand
Ā 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
Ā 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Ā 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Ā 

Automatic crime report classification through a weightless neural network

  • 1. Automatic Crime Report Classiļ¬cation through a Weightless Neural Network Rafael Adnet Pinho, Walkir A. T. Brito, Claudia L. R. Motta and Priscila Vieira Lima Federal University of Rio de Janeiro (UFRJ) Pos-Graduation Program in Informatics (PPGI), Rio de Janeiro, RJ - Brazil (rafaadnet, walkir.brito)@gmail.com, (claudiam, priscila.lima)@nce.ufrj.br Abstract. Anonymous crime reporting is a tool that helps to reduce and prevent crime occurrences. The classiļ¬cation of the crime reports re- ceived by the call center is necessary for the data organization and also to stipulate the importance of a particular report and its relation to others. The objective of this work is to develop a system that assists the call cen- terā€™s operator by recommending classiļ¬cation to new reports. The system uses a weightless neural network that automatically attribute a class to a report. At the end of this work it was possible to observe that auto- matic classiļ¬cations of crime reports with high accuracy are possible using a weightless neural network. 1 Introduction The Brazilian state of Rio de Janeiro receives more than 100,000 anonymous crime reports each year through the main crime report call center named Disque Denuncia, this is a program pretty similar to the American Crime Stoppers. The information of those crime reports is extremely important to reduce crime levels by helping the police and other authorities to realize more eļ¬ƒcient operations against criminals. Such important data is constantly analyzed and thousand of studies and re- sults are derived from it. However, all the reports are still been classiļ¬ed only by the call centerā€™s operators without any help of computer intelligence, leaving space for classiļ¬cations mistakes. The text classiļ¬cation is a process of label- ing text documents into one or more pre-speciļ¬ed categories. Due to the vast majority of web pages, emails, social networking information, and even corpo- rate information that is available in digital form, automatic text classiļ¬cation has gained attention in many research domains. For example, it has been used to categorize newspaper articles into topics [1], and classify network intrusion attacks as Positive and Negative [2]. Current classiļ¬cation methods such as decision trees, k-nearest neighbors, neural networks, support vector machines, and NaĀØıve Bayes have been successfully used in automated text classiļ¬cation. However, most similarity algorithms are not specially developed to compare and contrast crime reports, but general text reports. In addition, none of them, has used Weightless Neural Networks to perform this type of classiļ¬cation. This work intends to improve the task of crime report classiļ¬cation by de- veloping a Automatic Crime Report Classiļ¬er(ACRC) that uses computational intelligence in the reportā€™s text to assist the human classiļ¬cation process making 165 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.
  • 2. it more assertive. The automatic classiļ¬cation process was made using Weight- less Neural Networks, trained with texts of real crime reports. The results of this paper show that machine learning techniques such as Weightless Neural Networks can be very eļ¬ƒcient on ļ¬nding crime reports text similarities and consequently to the reportā€™s classiļ¬cation. The remainder of this text is organized as follows: Section 2 explains the fundamental knowledge to understand the paper, Section 3 describes the dataset used and the built system, Section 4 presents the system results and Section 5 concludes this article and points at further research topics. 2 Fundamentals Itā€™s essential to understand how the crime reports structure is divided. As il- lustrated by the ļ¬gure 1 the crime report has three fundamental parts, ā€Report Descriptionā€, ā€Main Classiļ¬cationā€ and ā€Secondary Classiļ¬cationsā€. Fig. 1: Report Structure. The Report Description is the denounce received by the call-center typed in natural language text by the operator, often describing the scene that was observed by the denunciator in which it is believed that a delict was being committed. The Main Classiļ¬cation deļ¬nes what is the principal delict by the operatorā€™s perspective. The last part is the Secondary Classiļ¬cation. This characteristic of the report structure makes possible to assign other classiļ¬cations to the report that were observed on the Report Description. The Secondary Classiļ¬cation is really important because it can determinate what authorities needs to be involved, it can change the importance of the report and help to determinate what kind of action needs to be take. To make the reportā€™s text usable to computers some natural language processing (NLP) techniques were used. NLP is a ļ¬eld that intersects with artiļ¬cial intelligence and linguistics. NLP techniques are frequently used to explore how computers can process and un- derstand natural language text or speech. Generally, any system that uses NLP includes tasks such as tokenization, sentence splitting, phrase segmentation and information extraction [3]. The ļ¬rst three tasks are low-level tasks used to iden- tify words, phrases, and sentences (described in the subsection 3.1), while the 166 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.
  • 3. last task is a high-level task used to extract relevant information in a domain. As a large training dataset was available for this work, the information extrac- tion was based on a neural network approach, using a weightless neural network (WNN) called WiSARD. Among all WNN, the WiSARD was chosen because itā€™s the most representative model and it was the ļ¬rst to be produced as a machine for a commercial propose [4]. WiSARD is an acronym of Wilkie, Stonham and Alksanderā€™s Recognition Device, that is a weightless and multi-discriminator net- work that was originally used for image recognition [4]. In brief, the WiSARD is online (the training is not strictly separated from the recognition and they can alternate), parallelizable (itā€™s possible to train diļ¬€erent patterns at the same time, as long as they are diļ¬€erent) and fast training neural model (it is possible to train it on a single round). The WiSARD has been widely used in many applications for patterns recog- nition such as HIV-1 sub-types categorization [5], music real-time tracking [6] and credit analysis [7]. It works creating random relations on the original data and them checking its existence during the training and recognition phases. Ev- ery new pattern presented to the WiSARD is represented as a discriminator that has a set of RAMs. The function of the RAMs is to store what are the random relations that were seen during the training phase and to respond if a speciļ¬c relation exists during the recognition phase. A discriminator is a structure that is basically responsible for the recognition of a single class among all others available classes. Each class has a maximum of 2n neurons (or RAMs) where n is the number of bits that each of the neurons will have. The weightless neuron, or RAM, is a tuple <Address, Boolean> that ļ¬‚ags if a speciļ¬c part of a pattern was seen by the discriminator. 3 Methodology 3.1 Dataset and Text Processing The dataset used in the experiments of this paper is a real dataset made of crime reports collected by Disque Denuncia during the year of 2015. It has 107,226 reports, each one with a text description, a main classiļ¬cation and zero or more secondary classiļ¬cations. All addresses and sensitive information were hidden for security reasons. Many techniques were used to treat the texts of the reports before using the WiSARD classiļ¬er. Basically ļ¬ve tasks were applied to the text of the reports: tokenizer, normalization, stopwords removal, sentence splitter and stemmer. The tokenization phase segments the text into individual tokens such as words and punctuation. The stemmer identiļ¬es the main part of tokens. For example, the stem of ā€™sellingā€™ and ā€™salesā€™ is ā€™saleā€™. The stopwords removal is a process to remove words that are not relevant to the similarity measure between diļ¬€erent texts, such as ā€™aā€™, ā€™anā€™ and ā€™theā€™, it also removes duplicated entities and keeps relevant entities. Some speciļ¬c words were manually added to the stopwords list because they appeared in the majority of the reports texts making them irrelevant for the text classiļ¬cation, for example, the word ā€™streetā€™ that appears 167 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.
  • 4. in 87% of the reports. 3.2 ACRC system Fig. 2: ACRC system. The Automatic Crime Report Classiļ¬er system is divided into three basic layers as shown by ļ¬gure 2. The Text Processing layer is where all the texts are treated. The technical details of this process are described in section 3.1. On the WiSARD Training layer, a part of the crime reports are used to train the WiSARD with diļ¬€erent types of crime classiļ¬cations. The last layer is the WiSARD Classiļ¬cation where all other reports that were not used in the training step are submitted to the system classiļ¬cation through the trained WiSARD network. The ACRC code is available online [8] and all the details about the experiment are explained in the following section. 4 Experimental results The ļ¬rst part of the experiment consisted of the selection of classes to be used since the 20 biggest classes contain 91% of all reports, they were the selected classes to be used. The counting of those classes can be found at table 1. On the experiment the k-fold cross-validation [9] was used with a k value of 10. After the text-processing of all training reports, it was made a matrix that each line was a report, and each column represented a speciļ¬c word from the whole group of unique words present in all training reports, in other words, each cell of the matrix represents the number of times that a word appears in a report. The PyWANN [10] was the WiSARD implementation used, itā€™s an open source stable version of the WiSARD developed in Python for general use. The WiSARD has been conļ¬gure with 8 RAMs, each one using 3 bits of memory ad- dressing. The Bleaching technique was used to overcome the saturation problem of the WiSARD [11]. With Bleaching, instead to mark if a certain part of the class pattern was observed or not, it counts how many times it was observed, a threshold value is set to determinate if the speciļ¬c part of the pattern that is been analyzed will be used or not. The Bleaching is generally a dynamic threshold mechanism but in this experiment was used a simpler and easy-to-use version of the Bleaching calibrated with a ļ¬xed threshold value of 3. As mentioned, 10% of each class reports were used to check the accuracy of the trained WiSARD. All text of the test reports were also treated by the same 168 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.
  • 5. Classiļ¬cation Number of Reports Accuracy (%) Drug Dealing 37261 64% Noise 8908 80% Ilegal use of public service 5555 95% Animal abuse 4319 91% Extortion 3982 63% Ilegal handgun possession 3756 72% Abandoned Vehicles 3345 70% Fraud 3216 63% Pedestrian theft 3091 59% Outlaw location 2651 79% Drug use 2624 38% Ilegal gambling 2569 74% Violence against the elderly 2549 76% Mistreatment 2460 45% Store without license 2411 56% Murder 1858 58% Closure of public roads 1846 74% Theft of automotive vehicles 1808 87% Violence against women 1795 75% Badern 1517 31% Table 1: Classiļ¬cation Results text-processing techniques described in section 3.1. Then the test reports were submitted to the trained WiSARD classiļ¬cation and one class was attributed by the WiSARD for each of the reports. Then the attributed class was compared with the classiļ¬cations that were manually attributed by humans of the Disque Denuncia, considered the correct ones. The results detailed in table 1 shows that only 3 classes (Drug use, Mistreatment, Badern) had a correct classiļ¬cation rate (accuracy) below 50%. That is a comprehensive result since those classes content are related to others, for instance, on a logical thought is hard to imagine a ā€Violence against womanā€ scenario without the woman been mistreated. The same thought applies to other relations such as ā€Drug useā€ related to ā€Drug Dealingā€ and ā€Badernā€ related to ā€Noiseā€. The training set had a mean (Āµ) of 0.674, a standard deviation (Ļƒ) of 0.167 and a coeļ¬ƒcient of variation (CV) of 0.25. Meaning that 75% of the results are concentrated around the mean (Āµ). 5 Conclusions The experiments showed that weightless neural networks like the WiSARD can contribute to the classiļ¬cation of crime reports. Nevertheless, is recommended the use of this approach as an auxiliary process to improve the human classiļ¬ca- tion, helping the call-center operator to classify the crime reports by reminding 169 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.
  • 6. them of a possible secondary classiļ¬cation that was not observed. A limitation to this work was identiļ¬ed since the system might occasionally classify two reports describing diļ¬€erent crimes as the same crime due to a high similarity of the text. This is because there is always some overlap in reports, e.g., a report of a murder that 90% of the text is used to describe the murder threat and only 10% to describe the actual murder, will be probably wrongly classiļ¬ed as ā€Murder Threatā€. More advanced text mining and classiļ¬cation techniques may be helpful in making the distinction between the diļ¬€erent crimes. Also, the ACRC system is hard to conļ¬gure and complex to use by people that are not familiar with Python code language. To make the system more practical and useful to law enforcement agencies, it must have an easy and user-friendly interface for interaction, this is part of a larger ongoing project. In the future, we plan to try more diļ¬€erent combinations on the ļ¬ne-tune of the WiSARD and compare the WiSARD accuracy and performance to other machine learning methods from the state-of-art (e.g. decision trees). Future works also include the use of the addresses of the reports inside the reportā€™s description, in order to improve the classiļ¬cation accuracy by making the re- ports localization an impact factor for the classiļ¬cation and police statistical demographic analysis. References [1] G Mamakis, A G Malamos, and J A Ware. An alternative approach for statistical single- label document classiļ¬cation of newspaper articles. Journal of Information Science, page 0165551511403543, 2011. [2] D C Wyld. Rubee: applying low-frequency technology for retail and medical uses. Man- agement Research News, 31(7):549ā€“554, 2008. [3] X Wang, L Zhang, T Xie, J Anvik, and J Sun. An approach to detecting duplicate bug reports using natural language and execution information. In Proceedings of the 30th international conference on Software engineering, pages 461ā€“470. ACM, 2008. [4] I. Aleksander, W.V. Thomas, and P.A. Bowden. Wisard: a radical step forward in image recognition. Sensor Review, 4(3):120ā€“124, 1984. [5] C Souza, F Nobre, P M V Lima, R Silva, R Brindeiro, and F M G FranĀøca. Recognition of hiv-1 subtypes and antiretroviral drug resistance using weightless neural networks. 2012. [6] D F P De Souza, F M G Franca, and P M V Lima. Real-time music tracking based on a weightless neural network. pages 64ā€“69, 2015. [7] D de O Cardoso, D S Carvalho, D S F Alves, D F P de Souza, H C C Carneiro, C E Pedreira, P M V Lima, and F M G FranĀøca. Credit analysis with a clustering ram-based neural classiļ¬er. In ESANN, 2014. [8] R Adnet Pinho. Acrc system, www.github.com/radnet/acrc, 2016. [9] P Refaeilzadeh, L Tang, and H Liu. Cross-validation. In Encyclopedia of database systems, pages 532ā€“538. Springer, 2009. [10] F Firmino. Pywann, www.github.com/ļ¬rmino/pywann, 2016. [11] D S Carvalho, H C C Carneiro, F M G FranĀøca, and P M V Lima. B-bleaching: Agile overtraining avoidance in the wisard weightless neural classiļ¬er. 2013. 170 ESANN 2017 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges (Belgium), 26-28 April 2017, i6doc.com publ., ISBN 978-287587039-1. Available from http://www.i6doc.com/en/.