SlideShare a Scribd company logo
Corruption detection Using Machine
Learning and Natural Language Processing
Supervised by
Dr. M.M.A. Hashem
Professor
Dept of CSE
Presented by
Md Zabirul Islam
Roll:1507110
Anik Pramanik
Roll:1507103
Outline
 Objective
 Introduction
 Methodology
i. Creating Datasets
ii. Data Processing
iii. Clustering Technique
 Results
 Conclusion & Future work
 References
Department of Computer Science and Engineering 1
Objective
 Corruption in Bangladesh has been a continuing
problem
 In general, corruption means “the abuse of
entrusted power for private gain”.
 There are some common sectors where
corruption is highly effected i.e. Public Services,
Land Administration, Tax Administration,
Customs Administration etc..
Department of Computer Science and Engineering 2
Introduction
 In this paper, an intelligent system has been developed by creating a user feedback
interface.
 When a person receives a service from an organization then he/she can submit his/her
opinion against specific person or the organization anonymously.
 Then clustering and NLP technique will be executed and output will be sorted for the
person of the organization according to their corruption level.
Department of Computer Science and Engineering 3
Flowchart
 The service receiver provide two types opinion.
 Feedback are stored into database .
 Then the proposed algorithm i.e. clustering and NLP technique
will execute separately to find out their corruption level.
Department of Computer Science and Engineering 4
Figure 1: System Flowchart
Methodology
Creating Datasets:
 When the user visits to the evaluation portal to
provide his/her opinion.
 The service receiver will get a form to
evaluate the employee.
 There are 5 psychological statements to
evaluate the employee.
 The options have provided points from 1 to 5.
Figure 2: Sample questions for employee A
Department of Computer Science and Engineering 5
Cont..
Data Preprocessing:
 We will store feedback of all users against
employee A.
 We will preprocess the data by calculating
average of users rating of each questions of
employee A.
 For other employee e.g. B, C, D we will do the
same and store them in database.
Figure 4: Average of each question of employee A
Department of Computer Science and Engineering 6
Figure 3: Feedback for employee A
Cont..
Clustering Algorithm:
 Our dataset created with 5 features or attributes (fig 5).
 This complete dataset with 5 dimension is used to
separate the corrupted people by using the proposed
“Static Centroid k-means Clustering Algorithm.
 Our proposed “Static Centroid k-means clustering”
almost similar with “k-means Clustering”.
Figure 5: Data for each employee
Department of Computer Science and Engineering 7
Cont..
 The difference is, in this clustering the centroid value is
defined manually and it will be fixed for all the centers.
 Before calculating static centroid k-means clustering,
we will execute traditional k-means clustering
 Cluster 1  honest person
. Cluster 2  less honest person
Cluster 3 corrupted employee’s group.
Department of Computer Science and Engineering 8
Figure 7: Clustered Data
Figure 8: Static Centers
Overall Methodology
Department of Computer Science and Engineering 9Static Centers
Ethical Distribution of an organization Clustered Data
Data for each employee
Average of each question of employee A
Feedback for employee ASample questions for employee A
Expected Result
 Using static centroids , we can easily calculate class label for new points.
 We will evaluate class of all employees and get a general idea of ethical standard
of the whole organization
Figure 9: Ethical Distribution of an organization
Department of Computer Science and Engineering 10
CONCLUSION AND FUTURE WORK
 This model will be effective in society if the corrupted people are being faced
punishment by using independent feedback about them.
 There are a lots of future scope of this model. The proposed model can be
upgraded by adding comment section .
 Auto mail sending option to concern organizations after a specific time duration
can be developed .
 It is possible to generate a history graph to find the improvement of employees .
Department of Computer Science and Engineering 11
References
 [1] e. V., T. (2018). Transparency International - What is Corruption? [online]
Transparency.org. Available at: https://www.transparency.org/what-is-corruption
[Accessed 12 May 2018].
 [2] Bliss, B. (2018). Bangladesh Corruption Report. [online] Business Anti-Corruption
Portal. Available at: https://www.business-anti-corruption.com/country-
profiles/bangladesh/ [Accessed 12 May 2018].
Department of Computer Science and Engineering 12
Corruption detection using machine learning and natural language

More Related Content

What's hot

Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association Rules
IJARIIE JOURNAL
 
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMS
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMSPREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMS
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMSSamsung Electronics
 
Predicting performance of classification algorithms
Predicting performance of classification algorithmsPredicting performance of classification algorithms
Predicting performance of classification algorithms
IAEME Publication
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
IRJET Journal
 
E018132735
E018132735E018132735
E018132735
IOSR Journals
 
Bb0020 managing information
Bb0020  managing informationBb0020  managing information
Bb0020 managing information
smumbahelp
 
Automatic Identification of Sub Assembly in an Assembly
Automatic Identification of Sub Assembly in an AssemblyAutomatic Identification of Sub Assembly in an Assembly
Automatic Identification of Sub Assembly in an Assembly
ishan kossambe
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET Journal
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
Dhanush Kasargod
 
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
Dotnet  maximum likelihood estimation from uncertain data in the belief funct...Dotnet  maximum likelihood estimation from uncertain data in the belief funct...
Dotnet maximum likelihood estimation from uncertain data in the belief funct...Ecway Technologies
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
IOSR Journals
 
what is a report?
what is a report?what is a report?
what is a report?
diegofvl1
 

What's hot (12)

Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association Rules
 
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMS
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMSPREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMS
PREDICTING PERFORMANCE OF CLASSIFICATION ALGORITHMS
 
Predicting performance of classification algorithms
Predicting performance of classification algorithmsPredicting performance of classification algorithms
Predicting performance of classification algorithms
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
 
E018132735
E018132735E018132735
E018132735
 
Bb0020 managing information
Bb0020  managing informationBb0020  managing information
Bb0020 managing information
 
Automatic Identification of Sub Assembly in an Assembly
Automatic Identification of Sub Assembly in an AssemblyAutomatic Identification of Sub Assembly in an Assembly
Automatic Identification of Sub Assembly in an Assembly
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
Dotnet  maximum likelihood estimation from uncertain data in the belief funct...Dotnet  maximum likelihood estimation from uncertain data in the belief funct...
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
 
what is a report?
what is a report?what is a report?
what is a report?
 

Similar to Corruption detection using machine learning and natural language

Strategic plan
Strategic planStrategic plan
Strategic plan
sarpedaniel
 
Data Science Machine
Data Science Machine Data Science Machine
Data Science Machine
Luis Taveras EMBA, MS
 
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and ChallengesIRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and Challenges
IRJET Journal
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft Detection
Camella Taylor
 
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
Daniel983829
 
A Study on Machine Learning and Its Working
A Study on Machine Learning and Its WorkingA Study on Machine Learning and Its Working
A Study on Machine Learning and Its Working
IJMTST Journal
 
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
Eswar Publications
 
Proposing an Interactive Audit Pipeline for Visual Privacy Research
Proposing an Interactive Audit Pipeline for Visual Privacy ResearchProposing an Interactive Audit Pipeline for Visual Privacy Research
Proposing an Interactive Audit Pipeline for Visual Privacy Research
Christan Grant
 
Predicting Employee Attrition using various techniques of Machine Learning
Predicting Employee Attrition using various techniques of Machine LearningPredicting Employee Attrition using various techniques of Machine Learning
Predicting Employee Attrition using various techniques of Machine Learning
IRJET Journal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
IJMIT JOURNAL
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
BhoirRitesh19ET5008
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
ijcsa
 
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
ijsc
 
In Banking Loan Approval Prediction Using Machine Learning
In Banking Loan Approval Prediction Using Machine LearningIn Banking Loan Approval Prediction Using Machine Learning
In Banking Loan Approval Prediction Using Machine Learning
IRJET Journal
 
Mano Vaidya: Gateway to Relaxation Via Machine Learning
Mano Vaidya: Gateway to Relaxation Via Machine LearningMano Vaidya: Gateway to Relaxation Via Machine Learning
Mano Vaidya: Gateway to Relaxation Via Machine Learning
IRJET Journal
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysis
csandit
 

Similar to Corruption detection using machine learning and natural language (20)

Strategic plan
Strategic planStrategic plan
Strategic plan
 
Data Science Machine
Data Science Machine Data Science Machine
Data Science Machine
 
IRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and ChallengesIRJET- Machine Learning: Survey, Types and Challenges
IRJET- Machine Learning: Survey, Types and Challenges
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft Detection
 
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
machine-learning-development-audit-framework-assessment-and-inspection-of-ris...
 
A Study on Machine Learning and Its Working
A Study on Machine Learning and Its WorkingA Study on Machine Learning and Its Working
A Study on Machine Learning and Its Working
 
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...
 
Proposing an Interactive Audit Pipeline for Visual Privacy Research
Proposing an Interactive Audit Pipeline for Visual Privacy ResearchProposing an Interactive Audit Pipeline for Visual Privacy Research
Proposing an Interactive Audit Pipeline for Visual Privacy Research
 
Predicting Employee Attrition using various techniques of Machine Learning
Predicting Employee Attrition using various techniques of Machine LearningPredicting Employee Attrition using various techniques of Machine Learning
Predicting Employee Attrition using various techniques of Machine Learning
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
Final
FinalFinal
Final
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
 
In Banking Loan Approval Prediction Using Machine Learning
In Banking Loan Approval Prediction Using Machine LearningIn Banking Loan Approval Prediction Using Machine Learning
In Banking Loan Approval Prediction Using Machine Learning
 
Mano Vaidya: Gateway to Relaxation Via Machine Learning
Mano Vaidya: Gateway to Relaxation Via Machine LearningMano Vaidya: Gateway to Relaxation Via Machine Learning
Mano Vaidya: Gateway to Relaxation Via Machine Learning
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysis
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

Corruption detection using machine learning and natural language

  • 1. Corruption detection Using Machine Learning and Natural Language Processing Supervised by Dr. M.M.A. Hashem Professor Dept of CSE Presented by Md Zabirul Islam Roll:1507110 Anik Pramanik Roll:1507103
  • 2. Outline  Objective  Introduction  Methodology i. Creating Datasets ii. Data Processing iii. Clustering Technique  Results  Conclusion & Future work  References Department of Computer Science and Engineering 1
  • 3. Objective  Corruption in Bangladesh has been a continuing problem  In general, corruption means “the abuse of entrusted power for private gain”.  There are some common sectors where corruption is highly effected i.e. Public Services, Land Administration, Tax Administration, Customs Administration etc.. Department of Computer Science and Engineering 2
  • 4. Introduction  In this paper, an intelligent system has been developed by creating a user feedback interface.  When a person receives a service from an organization then he/she can submit his/her opinion against specific person or the organization anonymously.  Then clustering and NLP technique will be executed and output will be sorted for the person of the organization according to their corruption level. Department of Computer Science and Engineering 3
  • 5. Flowchart  The service receiver provide two types opinion.  Feedback are stored into database .  Then the proposed algorithm i.e. clustering and NLP technique will execute separately to find out their corruption level. Department of Computer Science and Engineering 4 Figure 1: System Flowchart
  • 6. Methodology Creating Datasets:  When the user visits to the evaluation portal to provide his/her opinion.  The service receiver will get a form to evaluate the employee.  There are 5 psychological statements to evaluate the employee.  The options have provided points from 1 to 5. Figure 2: Sample questions for employee A Department of Computer Science and Engineering 5
  • 7. Cont.. Data Preprocessing:  We will store feedback of all users against employee A.  We will preprocess the data by calculating average of users rating of each questions of employee A.  For other employee e.g. B, C, D we will do the same and store them in database. Figure 4: Average of each question of employee A Department of Computer Science and Engineering 6 Figure 3: Feedback for employee A
  • 8. Cont.. Clustering Algorithm:  Our dataset created with 5 features or attributes (fig 5).  This complete dataset with 5 dimension is used to separate the corrupted people by using the proposed “Static Centroid k-means Clustering Algorithm.  Our proposed “Static Centroid k-means clustering” almost similar with “k-means Clustering”. Figure 5: Data for each employee Department of Computer Science and Engineering 7
  • 9. Cont..  The difference is, in this clustering the centroid value is defined manually and it will be fixed for all the centers.  Before calculating static centroid k-means clustering, we will execute traditional k-means clustering  Cluster 1  honest person . Cluster 2  less honest person Cluster 3 corrupted employee’s group. Department of Computer Science and Engineering 8 Figure 7: Clustered Data Figure 8: Static Centers
  • 10. Overall Methodology Department of Computer Science and Engineering 9Static Centers Ethical Distribution of an organization Clustered Data Data for each employee Average of each question of employee A Feedback for employee ASample questions for employee A
  • 11. Expected Result  Using static centroids , we can easily calculate class label for new points.  We will evaluate class of all employees and get a general idea of ethical standard of the whole organization Figure 9: Ethical Distribution of an organization Department of Computer Science and Engineering 10
  • 12. CONCLUSION AND FUTURE WORK  This model will be effective in society if the corrupted people are being faced punishment by using independent feedback about them.  There are a lots of future scope of this model. The proposed model can be upgraded by adding comment section .  Auto mail sending option to concern organizations after a specific time duration can be developed .  It is possible to generate a history graph to find the improvement of employees . Department of Computer Science and Engineering 11
  • 13. References  [1] e. V., T. (2018). Transparency International - What is Corruption? [online] Transparency.org. Available at: https://www.transparency.org/what-is-corruption [Accessed 12 May 2018].  [2] Bliss, B. (2018). Bangladesh Corruption Report. [online] Business Anti-Corruption Portal. Available at: https://www.business-anti-corruption.com/country- profiles/bangladesh/ [Accessed 12 May 2018]. Department of Computer Science and Engineering 12