Mini Project
Mini Project
Mini Project
A PROJECT REPORT
Submitted by
BACHELOR OF ENGINEERING
IN
Chandigarh University
MAY 2024
TABLE OF CONTENTS
List of Figures ............................................................................................................ i
List of Tables ........................................................................................................... ii
Abstract ........................................................................................................................... 4
Graphical Abstract ............................................................ Error! Bookmark not defined.
The increase in crime data recording coupled with data analytics resulted in the growth of research
approaches aimed at extracting knowledge from crime records to better understand criminal behavior
and ultimately prevent future crimes. While many of these approaches make use of clustering and
association rule mining techniques, there are fewer approaches focusing on predictive models of crime.
In this paper, we explore models for predicting the frequency of several types of crimes by LSOA code
(Lower Layer Super Output Areas — an administrative system of areas used by the UK police) and the
frequency of anti-social behavior crimes. Three algorithms are used from different categories of
approaches: instance-based learning, regression and decision trees. The data are from the UK police
and contain over 600,000 records before preprocessing. The results, looking at predictive performance
as well as processing time, indicate that decision trees (M5P algorithm) can be used to reliably predict
crime frequency in general as well as anti-social behavior frequency. The experiments were conducted
using the SCIAMA High Performance Computer Cluster at the University of Portsmouth.
REPRESENTATION: This describes how we want to express and organize our data.
EVALUATION: Here, we assess the accuracy of the designed model, either through scoring or
manual evaluation.
OPTIMIZATION: We identify the learner with the highest rating from the evaluation function
using various optimization techniques.
Machine learning is divided into two main fields: supervised and unsupervised learning.
Supervised learning accounts for approximately 70% of machine learning applications, while
unsupervised learning constitutes about 10-20%.
The dataset selected for our studies was initially inconsistent. We have since standardized it to
enhance reliability. In this paper, we explored various machine learning algorithms, including
Naïve Bayes, Logistic Regression, Multilayer Perceptron, SMO, IBk, Kstar, Multi Scheme,
Random Tree, and Random Forest. While performance improved, we recognized that this is a
sensitive area that can significantly impact user experience and security. Through feature
selection, we achieved desirable results that raised accuracy to a commendable level.
The process begins with inputting data into the selected algorithms, followed by testing the
latest input data for compatibility. We then check predictions against outcomes; if they do not
align, the algorithm can be refined through multiple iterations. Early and accurate face
detection can dramatically reduce costs associated with security breaches and enhance user
interactions. Unfortunately, current detection methods can be slow and inefficient, highlighting
the critical need for streamlined and effective screening procedures. Thus, a time-efficient and
convenient face detection system is on the horizon, enabling professionals to make informed
decisions regarding security measures and user engagement.
1.4. Timeline
Chapter 1: Introduction
The opening chapter will lay the groundwork for the research by exploring the critical need for
enhanced accuracy in face detection technology. This section will identify key stakeholders, such
as developers, businesses, security professionals, and end-users, emphasizing the real-world
implications of reliable and efficient face detection systems. It will also delve into contemporary
issues surrounding current face detection practices, highlighting the gaps that necessitate this
research.
The problem statement will be clearly articulated, setting the stage for the research objectives and
tasks. Additionally, a detailed timeline will be provided, offering a roadmap for the project’s
progression. The chapter will conclude with an overview of the report's structure, guiding the
reader on what to expect in subsequent sections.