Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 32

Visvesvaraya Technological University

“Jnana Sangama’’Belagavi-590018

Internship Report on
A Machine Learning Approach for
Global Terrorism Analysis
Submitted in partial fulfillment for the award of Degree of

Bachelor of Engineering
Submitted by
K. N .DEEPSHI (1VE17EC045)
Under the guidance of

Internal Guide External Guide


SARALA.T UMA.N
Assistant Professor HR Manger
Dept. of ECE, SVCE Knowx Innovation (P) Ltd

Department of Electronics & Communication Engineering


Sri Venkateshwara College of Engineering
Bengaluru-562157

ACY: 2021-22
Sri Venkateshwara College of Engineering
Department of Electronics & Communication Engineering

CERTIFICATE

Certified that the internship work entitled “MACHINE LEARNING” was carried
out by Ms. K N DEEPSHI (1VE17EC045) who is a bonafide student of VIII
Semester Electronics & Communication Engineering, Sri Venkateshwara College
of Engineering. This is in partial fulfillment for the award of Bachelor of
Engineering of Visvesvaraya Technological University, Belagavi, during the year
2021-2022. It is certified that all corrections/suggestions indicated for internship
internal assessment have been incorporated in there port. The internship report has
been approved as it satisfies the academic requirements in the respect of seminar
work prescribed for the said degree.

Signature of the Guide Signature of the HOD Signature of the Principal


Prof. Sarala.T Dr. Jijesh J J Dr. Nageswara Guptha M
Assistant Professor Associate Professor Principal,
Dept. E&CE, SVCE, & SVCE,
Bengaluru. Head of Department Bengaluru.
Dept. E&CE, SVCE,
Bengaluru.
.

CERTIFICATE
ACKNOWLEDGEMENT
My most sincere and grateful thanks to SRI VENKATESHWARA COLLEGE OF
ENGINEERING, for giving an opportunity to pursue the B.E in Electronics & Communication
Engineering and thus helping to share career. First and foremost, I would like to express my
gratitude to Dr. Nageswara Guptha M, PRINCIPAL, SVCE, Bengaluru, for his support in
bringing this internship to completion.

I would like to extend our sincere thanks to Dr. Jijesh J J, Associate Professor and Head,
Department of Electronics and Communication Engineering, SVCE, Bengaluru, for his
suggestion which helped me to complete the internship.

I would also like to sincere thanks to internal guide Prof. Sarala T, Assistant Professor,
Department of Electronics and Communication Engineering, SVCE, Bangalore, for his
guidance and support in bringing this internship to completion.

I consider it as a privilege to express our sincere gratitude and respect to Mrs. Uma N, Knowx
Innovation (P) Ltd for being our guide, for his integral and being constant source of
inspiration throughout the project.

Word cannot express the immense gratitude I have for parents who has been instrumental in
shaping my career. I am thankful to all our lectures and friends who have been the sources of
inspiration to all endeavors.

Yours Sincerely,

K N DEEPSHI
(1VE17EC045)
COMPANY PROFILE

Knowx Innovations Pvt Ltd was established in the


year 2005 by a group of tech savvy professionals with a multifaceted
hardware and software background, focuses on engineering services and
IT staffing solutions.

KNOWX team has in depth expertise in developing embedded and real


time software for various domains, including Multimedia, Automotive, Networking, Telecom,
Cloud Computing and Wireless Communication. We specialize in Systems Design, Custom
Software Development, Firmware, and driver development. KNOWX team has executed
projects using most of the popular embedded system chips and operating Systems.

Our strength in embedded systems software and hardware design and development makes us
one stop partner for product development and R&D and are capable of handling the entire
development cycle from concept to final product realization.

With over 15 years of operational experience in staff augmentation solutions,


KNOWX has resources and access to a global network of talent across
technologies and industries to provide with the right manpower. Knowx is a top
quality service provider with a deep domain expertise in Multimedia,
Automotive, Networking, Telecom, Cloud computing and Wireless.
ABOUT THE COMPANY

Vision

Our vision is to emerge as a global leader in embedded software development and


hardware design services.

Mission
We at Knowx help you discover exciting opportunities to work on leading edge
technologies like Internet of Things, Artificial intelligence, Cloud, Mobility and Data
analytics. Take your career to new pinnacles and realize your dream.

Team
KNOWX Innovation has 4 major divisions in the organization:

1. Construction department: has 15 employees.

2. Maintenance department: has 15 employees.

3. Designing department: has 15 employees.

4. Training department: has 20 employees.

Altogether, KNOWX Innovation has employed over 65 employees of which 20

employees are situated in India and 45 in are based in Qatar

Services

1) Embedded System & Product Engineer


2) Machine Learning
3) Internet of Things
4) Artificial Intelligence
TABLE OF CONTENTS

Chapter No. Contents Page No.


1. Introduction 1-4
1.1 Motivation
1.2 Machine Learning
1.3 Objective of the work
1.4 Key features with scope of the features
1.5 Advantages and Disadvantages
1.6 Chapter Summary
2. Machine learning 5-14
2.1 Methodology
2.2 Block Diagram
2.3 Overall System Architecture
2.4 Input/output Design
2.5 Sequence Diagram
2.6 Algorithm
2.7 Flow Diagram
2.8 Chapter Summary
3. Components Required 15-17
3.1 System Requirement Specification
3.2 Hardware Requirements
3.3 Software Requirements
3.4 Chapter Summary
4. Work Carried Out 18-20
4.1 Python
4.2 Task Performed
4.3 Chapter Summary
Results and Discussion 21
Conclusion 22
References 23-24
GLOBAL TERRORISM 2021-2022

Chapter 1
INTRODUCTION

Terrorist attacks are spreading on a great pace across the world. As per the United Nations
definition of Terrorism,” any action with a political goal that is intended to cause death or serious
bodily harm to civilians” [1]. Around 22 thousand events occurred globally in the last year,
causing over 18 thousand casualties [2]. The factors leading to terrorism change over time since
they are dependent upon multiple political and social reasons. Apart from predicting the son
behind the attack, identification of the responsible agencies is also difficult. There has been a
dearth he information regarding patterns of widespread terrorist behavior The existing analyses
are either case studies or quantitative methods such as regression analysis. The former of these is
specific to certain events, while the latter approach is restricted to interviews of civilians
impacted by the attack. Most of these analyses depend on factors such as weapons used for the
attacks and the number of people harm another type of analysis includes investigation of unusual
patterns in individual behaviors or questioning detainees to acquire outing. The current research
is focused on finding out the correlation between terrorism and its causal factors. Existing efforts
have not been good enough for prediction. Machine learning approaches can ad in predicting the
likelihood of a terrorist attack, given the required data. The results of this work can help the
security agencies and policymakers eradicate terrorism by taking relevant and effective
measures.

This paper provides an approach to analyzing terrorism region and country with the machine
learning techniques terrorism specific pledged to fetch conclusions about terrorist behavior
patterns. Through analysis of events using GTD, six supervised machine learning models
(Gaussian Naïve Bayes, Linear Discriminant Analysis, k-Nearest Neighbors, Support Vector
Machines, Decision Tree, and Logistic Regression) were built and evaluated on their
performances. The rest paper is organized is as follows: Related work is presented in Section II.
Analysis of data and prediction models are described in Section III. Results are discussed in
Section IV.

Dept. of E&CE, SVCE, Bengaluru Page 1


GLOBAL TERRORISM 2021-2022

1.1Motivation

Terrorist attacks are spreading on a great pace across the world. As per the United Nations
definition of Terrorism,” any action with a political goal that is intended to cause death or serious
bodily harm to civilians”. In the last year, around 22 thousand events occurred globally, causing
over 18 thousand casualties.

1.2 Machine Learning

Data science, machine learning and artificial intelligence are some of the top trending topics in
the tech world today. Data mining and Bayesian analysis are trending and this is adding the
demand for machine learning. This tutorial is your entry into the world of machine learning.
Machine learning is a discipline that deals with programming the systems so as to make them
automatically learn and improve with experience. Here, learning implies recognizing and
understanding the input data and taking informed decisions based on the supplied data. It is very
difficult to consider all the decisions based on all possible inputs.

Fig 1.3: Machine Learning

To solve this problem, algorithms are developed that build knowledge from a specific data and
past experience by applying the principles of statistical science, probability, logic, mathematical
optimization, reinforcement learning, and control theory.

Dept. of E&CE, SVCE, Bengaluru Page 2


GLOBAL TERRORISM 2021-2022

1.2 Objectives

 The factors leading to terrorism change over time since they are dependent upon multiple
political and social reasons.
 Hence the detecting of global terrorism is necessary for saving the people of the country
against all the terror attacks.

1.3 Applications of Machine Learning Algorithms


The developed machine learning algorithms are used in various applications such as:
 Vision processing

 Language processing

 Forecasting things like stock market trends, weather

 Pattern recognition

 Games

 Data mining

 Expert systems

 Robotics

1.4 Key features with scope of the features or overall scope of the work
Machine learning approaches can ad in predicting the likelihood of a terrorist attack, given the
required data. The results of this work can help the security agencies and policy makers to
eradicate terrorism by taking relevant and effective measures.

1.5 Advantages

1. Libraries helps to analyses the data.


2. Statistical and prediction is very easy comparing to existing technologies.
3. Results will be accurate compared to other methodologies.

Dept. of E&CE, SVCE, Bengaluru Page 3


GLOBAL TERRORISM 2021-2022

1.6 Disadvantages :

1. Complexity in analyzing the data.


2. Prediction is challenging task working in the model
3. Coding is complex maintaining multiple methods.
4. Libraries support was not that much familiar.

1.7 Chapter Summary


To summarize Chapter 1, the Proposed Project Work it speaks about the introduction, which
gives the details about how we proceed with the work the different phases in it and the
advantages and disadvantages, objectives

Dept. of E&CE, SVCE, Bengaluru Page 4


GLOBAL TERRORISM 2021-2022

Chapter 2
Machine Learning
2.1 Methodology

By centering the above issues, comes the need to create and plan an ease water quality observing
framework that can screen water quality progressively utilizing IoT environment.

2.2 Block Diagram


System design is the process of defining the architecture, components, modules, interfaces
and data for a system to satisfy specified requirements. One could see it as the application
of systems theory to product development. There is some overlap with the disciplines of
systems analysis, systems architecture and systems engineering. If the broader topic of
product development "blends the perspective of marketing, design, and manufacturing into
a single approach to product development,"

Fig 2.3: System Architecture

then design is the act of taking the marketing information and creating the design of the
product to be manufactured. Systems design is therefore the process of defining and

Dept. of E&CE, SVCE, Bengaluru Page 5


GLOBAL TERRORISM 2021-2022

developing systems to satisfy specified requirements of the user.

Dataset: The dataset of global terrorism is imported to our Naïve Bayes algorithm.

Data Preprocessing: The dataset data is preprocessed and converted into clean dataset.

Applying algorithm: The Naïve Bayes algorithm is applied for the global terrorism analysis.

Prediction: The global terrorism record is detected and analyzed.

2.3 Input / Output Design

The dataset of global terrorism is imported. The dataset is csv file. The dataset preprocessing is
done to convert dataset into clean dataset.

Dataset Preprocessing

Dataset input(.csv) Global


Terrorism Analysis

Preprocessing
Input Output

Fig 2.4: Input / Output Design

The algorithm is applied for the global terrorism analysis.The global terrorism record is
analysed.

2.3.1 Object Oriented Design


Object-oriented system design involves defining the context of a system followed by designing
the architecture of the system. Context The context of a system has a static and a dynamic part.
The static context of the system is designed using a simple block diagram of the whole system
which is expanded into a hierarchy of subsystems.
 Class Diagram

Dept. of E&CE, SVCE, Bengaluru Page 6


GLOBAL TERRORISM 2021-2022

A class diagram in the Unified Modeling Language (UML) is a type of static structure
diagram that describes the structure of a system by showing the system's classes, their
attributes, operations (or methods), and the relationships among objects. . It is used for
general conceptual modeling of the structure of the application, and for detailed modeling,
translating the models into programming code.

Fig 2.4.1: Class Diagram

The class diagram is the main building block of object-oriented modeling.

2.4.2 Activity Diagram

Activity diagrams are graphical representations of workflows of stepwise activities and


actions[1] with support for choice, iteration and concurrency.

In the Unified Modeling Language, activity diagrams are intended to model both computational
and organizational processes (i.e., workflows), as well as the data flows intersecting with the
related activities.[2][3] Although activity diagrams primarily show the overall flow of control,
they can also include elements showing the flow of data between activities through one or more
data stores [ citation model]. Activity diagrams can be regarded as a form of a
structured flowchart combined with a traditional data flow diagram. Typical flowchart
techniques lack constructs for expressing concurrency.[5]

Dept. of E&CE, SVCE, Bengaluru Page 7


GLOBAL TERRORISM 2021-2022

However, the join and split symbols in activity diagrams only resolve this for simple cases; the
meaning of the model is not clear when they are arbitrarily combined with decisions or loops.
[citation needed]
.

Fig 2.4.2: Activity Diagram

In the Unified Modeling Language, activity diagrams are intended to model both computational
and organizational processes (i.e., workflows), as well as the data flows intersecting with the
related activities.

2.4.3 State Transition Diagram

A state diagram is a type of diagram used in computer science and related fields to describe the
behavior of systems. State diagrams require that the system described is composed of a finite
number of states.

Dept. of E&CE, SVCE, Bengaluru Page 8


GLOBAL TERRORISM 2021-2022

State diagrams require that the system described is composed of a finite number of states;
sometimes, this is indeed the case, while at other times this is a reasonable abstraction

Fig 2.4.3: State Transition Diagram

sometimes, this is indeed the case, while at other times this is a reasonable abstraction. Many forms
of state diagrams exist, which differ slightly and have different semantics.

2.4.4 Data Flow Diagram(DFD)

A data flow diagram is a graphical representation of the "flow" of data through an information
system, modeling its process aspects. Often they are a preliminary step used to create an
overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design). The DFD is also called as bubble chart. It is
a simple graphical formalism that can be used to represent a system in terms of the input data to
the system, various processing carried out on these data, and the output data is generated by the
system. For each data flow, at least one of the endpoints (source and / or destination) must exist
in a process. The refined representation of a process can be done in another data-flow diagram,
which subdivides this process into sub-processes.

Dept. of E&CE, SVCE, Bengaluru Page 9


GLOBAL TERRORISM 2021-2022

Data-flow diagrams can be regarded as inverted Petri nets, because places in such networks
correspond to the semantics of data memories. Analogously, the semantics of transitions from
Petri nets and data flows and functions from data-flow diagrams should be considered
equivalent.

Fig 2.4.4: Data Flow Diagram(DFD)

The data-flow diagram is a tool that is part of structured analysis and data modelling. When
using UML, the activity diagram typically takes over the role of the data-flow diagram. A special
form of data-flow plan is a site-oriented data-flow plan.

2.4.5 : UML Diagrams

Unified Modeling Language (UML) is a standardized general-purpose modeling language in the


field of object-oriented software engineering. The standard is managed, and was created, by the
Object Management Group.

2.4.5 Use Case Diagrams


A use case diagram at its simplest is a graphical representation of a user's interaction with the
system and depicting the specifications of a use case. A use case diagram can portray the
different types of users of a system and the various ways that they interact with the system.

Dept. of E&CE, SVCE, Bengaluru Page 10


GLOBAL TERRORISM 2021-2022

2.4.5.1 Level-1
The main program contains login and register, if the user is having is having an account they can
login otherwise they to register to create a new account.

Fig 2.4.5.1 : Level 1


In a main program open it will be displayed by on a register and login button.

2.4.5.2 Level-2
If you click on the register button fields will be open (username, password, emails, and phones) .
After fill with a fields you can signup. i will show register done then it will open lothe gin page.

Fig 2.4.5.2 : Level 2

If you click on the register button fields will be open (username, password, emails, and phones) .
After fill with a fields you can sign up. I will show register done then it will open lothe gin page.

Dept. of E&CE, SVCE, Bengaluru Page 11


GLOBAL TERRORISM 2021-2022

2.4.5.3 Level-3
The login page will be displayed then we should enter a username and password (wrong
password).

Fig 2.4.5.2.3: Level 3

I will show error, we have give a exact username and password program will be executed.

2.5 Sequence Diagram


A sequence diagram or system sequence diagram (SSD) shows process interactions arranged in
time sequence in the field of software engineering.

Fig 2.5 Sequence Diagram


It depicts the processes involved and the sequence of messages exchanged between the processes
needed to carry out the functionality. Sequence diagrams are typically associated with use case
realizations in the 4+1 architectural view model of the system under development.

Dept. of E&CE, SVCE, Bengaluru Page 12


GLOBAL TERRORISM 2021-2022

2.6 Algorithm

2.6.1. Naïve Bayes

 Naive Bayes classifiers are a collection of classification algorithms based on Bayes’


Theorem. It is not a single algorithm but a family of algorithms where all of them share a
common principle, i.e. every pair of features being classified is independent of each
other.
 A Naive Bayes classifier is a probabilistic machine learning model that’s used for
classification task.
 Naive Bayes classifiers are highly scalable, requiring a number of parameters linear in the
number of variables (features/predictors) in a learning problem. Maximum-like-li-
hood training can be done by evaluating a closed-form expression,[4]: 718 which takes linear
time, rather than by expensive iterative approximation as used for many other types of
classifiers.

Types of Naive Bayes Classifier:

 Multinomial Naive Bayes:


This is mostly used for document classification problem, i.e whether a document
belongs to the category of sports, politics, technology etc. The features/predictors
used by the classifier are the frequency of the words present in the document.
 Bernoulli Naive Bayes:

This is similar to the multinomial naive bayes but the predictors are boolean
variables. The parameters that we use to predict the class variable take up only
values yes or no, for example if a word occurs in the text or not.
 Gaussian Naive Bayes:
When the predictors take up a continuous value and are not discrete, we assume that
these values are sampled from a Gaussian distribution.

Dept. of E&CE, SVCE, Bengaluru Page 13


GLOBAL TERRORISM 2021-2022

2.7 Flow Diagram


Flow chart that takes us through the criteria and decision points that can lead to a suspect
terrorist’s being ignored as a minor nuisance, being prosecuted in federal court, being held in a
Pakistani prison, or being met with the business end of a Hellfire missile.

Fig 2.7 : Flow Chart

Over the past two years, the Obama administration has begun to formalize a so-called
“disposition matrix” for suspected terrorists abroad: a continuously evolving database that
spells out the intelligence on targets and various strategies, including contingencies, for
handling them. Although the government has not spelled out the steps involved in deciding how
to treat various terrorists, a look at U.S. actions in the past makes it possible to reverse-engineer
a rough decision tree for certain types of suspects.

2.8 Chapter Summary

To summarize Chapter 2, the Proposed Project Work it speaks about the Methodology, which
gives the details about how we proceed with the project work the different phases in it and
the implementation techniques and also steps involved in the working of project protype.

Dept. of E&CE, SVCE, Bengaluru Page 14


GLOBAL TERRORISM 2021-2022

Chapter 3
COMPONENTS REQUIRED
1.1 System Requirement Specification
A System Requirements Specification (SRS) (also known as a Software Requirements
Specification) is a document or set of documentation that describes the features and behavior of
a system or software application.

3.1.1 System Analysis

Prediction of terrorism activities is an important area of concern for researchers. . A large


number of events makes it difficult to predict terrorist groups responsible for some terrorist
activity.

The current research is focused on finding out the correlation between terrorism and its causal
factors. Existing efforts have not been good enough for prediction. Machine learning
approaches can ad in predicting the likelihood of a terrorist attack, given the required data. The
results of this work can help the security agencies and policymakers to eradicate terrorism by
taking relevant and effective measures.

Hence there is an approach to analyzing terrorism region and country with the machine learning
techniques and terrorism specific knowledge to fetch conclusions about terrorist behavior
patterns.

3.1.2 Functional Requirements

The particular necessities are user interfaces. The outside clients are the customers.
Every one of the customers can utilize this product for the ordering and looking.

 Hardware Interfaces: The outside equipment interface utilized for ordering and looking is
the PCs of the customers. PCs might be portable PCs with remote LAN as the web
association gave will be remote.

Dept. of E&CE, SVCE, Bengaluru Page 15


GLOBAL TERRORISM 2021-2022

 Software Interfaces: The working Frameworks can be any rendition of windows.

 Performance Prerequisites: The PC's utilized must be at least 4 machine with the goal that

they can give ideal execution of the item.

3.1.3 Non-Functional Requirements

Non utilitarian necessities are the capacities offered by the framework. It incorporates time

imperative and requirement on the advancement procedure and models. The non useful

prerequisites are as per the following:

 Speed: The framework ought to prepare the given contribution to yield inside fitting time.

 Ease of utilization: The product tought to be easy to understand. At that point the clients can

utilize effortlessly, so it doesn't require much preparing time.

 Reliability: The rate of disappointments ought to be less then just the framework is more

solid.

 Portability: It thought to be anything but difficult to actualize in any framework

3.2 Hardware requirements

The most widely recognized arrangement of prerequisites characterized by any working


framework or programming application is the physical PC assets, otherwise called
equipment, An equipment necessities list is frequently joined by an equipment similarity list,
particularly if there should be an occurrence of working frameworks. A HCL records tried,
perfect, and now and then incongruent equipment gadgets for a specific working framework
or application. The accompanying sub-segments examine the different parts of equipment
prerequisites.
All PC working frameworks are intended for a specific PC design. Most programming
applications are restricted to specific working frameworks running on specific structures. In

Dept. of E&CE, SVCE, Bengaluru Page 16


GLOBAL TERRORISM 2021-2022

spite of the fact that engineering free working frameworks and applications exist, most
should be recompiled to keep running on another design.
The energy of the focal preparing unit (CPU) is a central framework necessity for any
product. Most programming running on x86 engineering characterizes preparing power as
the model and the clock speed of the CPU. Numerous different highlights of a CPU that
impact its speed and power, similar to transport speed,storage, and MIPS are frequently
overlooked. This meaning of energy is regularly wrong, as AMD Intel Pentium CPUs at
comparative clock speed frequently have distinctive throughput speeds.
• 10GB HDD(min)

• 128 MB RAM(min)

• Pentium P4 Processor 2.8Ghz(min)

3.3 Software requirements

Programming necessities manage characterizing programming asset necessities and

requirements that should be introduced on a PC to give ideal working of an application.

These necessities or requirements are for the most part excluded in the product establishment

bundle and should be introduced independently before the product is introduced.

 Python 3.7 or higher

 Pycharm

 opencv

3.4 Chapter Summary

To summarize Chapter 4, it speaks about the components required, which gives the details

about how we proceed with the Hardware and software details

Dept. of E&CE, SVCE, Bengaluru Page 17


GLOBAL TERRORISM 2021-2022

Chapter 4
Work Carried Out

4.1 What is Python?

Python is a popular programming language. It was created by Guido van Rossum, and

released in 1991.

It is used for:

• web development (server-side),

• software development,

• system scripting.

What can Python do?

• Python can be used on a server to create web applications.

• Python can be used alongside software; lto create workflows.

• Python can connect to database systems. It can also read and modify files.

• Python can be used to handle big data and perform complex mathematics.

• Python can be used for rapid prototyping, or for production-ready software development.

Why Python?

• Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.).

• Python has a simple syntax similar to the English language.

• Python has syntax that allows developers to write programs with fewer lines than other.

• Python runs on an interpreter system, meaning that code can be executed as soon as it is

written. This means that prototyping can be very quick.

• Python can be treated in a procedural way, an object-orientated way or a functional way.

Dept. of E&CE, SVCE, Bengaluru Page 18


GLOBAL TERRORISM 2021-2022

Advantages of Python

• Extensive support libraries (Numpy for numerical calculations, Pandas for data analytics

etc.)

• Open source and community development

• Easy to learn

• User-friendly data structures

• High level language

• Dynamically Typed language

• Object-oriented language

4.2 Task Performed

Weekly Work Plan:

Week 1:

1. On the first week, we were introduced to installation of Python v.3.7 or above.

3. This exercise helped us understand the importance of Python , input/output basics and

their library functions for executing programs in Machine Learning

Week 2:

1. We were introduced to installation of Libraries used in Pip.

2. We were introduced to Python.

3. We were taught about basic functions of Python like of variables, displaying contents.

4. We were taught how to implement Python in Python v.3.7 or above.

Week 3:

1. We were introduced how to run the programs in Python v.3.7 or above.

2. Later we were taught how to use datasets to execute the program.

Dept. of E&CE, SVCE, Bengaluru Page 19


GLOBAL TERRORISM 2021-2022

Week 4:

1. PROJECT –Global Terrorism

2. This project analyses of terrorism in different countries

Week 5:

1. We worked on a project using Numpy, mathplot Libraries of Python

2. Submission of the project.

4.3 Chapter Summary

To summarize Chapter 4, the Plan of the Work it speaks about the what all the works are
carried out, which gives the details about how we proceed with the work the different phases
in it and the implementation technology description and also steps involved in the working of
pro type and task performed.

Dept. of E&CE, SVCE, Bengaluru Page 20


GLOBAL TERRORISM 2021-2022

RESULTS AND DISCUSSION

The Naïve Bayes algorithm can be applied to our code for the analysis of the global terrorism
facts. Thus it gives the accuracy as an output. Hence the global terrorism analysis is done in our
project.

The total number of deaths from terrorism declined in 2021, falling by 1.2 per cent to 7,142
(Figure 1.1). This is the fourth consecutive year where deaths from terrorism remained fairly
constant. However, there has been a 33 per cent reduction since the peak in 2015 when 10,699
people were killed in terrorist attacks. The primary driver of this reduction in 2021 has been a
fall in the intensity of conflict in the Middle East, and the subsequent decline of the Islamic State
(IS) in Iraq and Syria. However, increases in the number of deaths were recorded in three of the
nine regions - Asia-Pacific, North America and South Asian regions, which increased by 303, 66

Dept. of E&CE, SVCE, Bengaluru Page 21


GLOBAL TERRORISM 2021-2022

and eight per cent respectively. North America was off a very low base, recording three deaths
from terrorism in 2020 and five in 2021. Despite the year-on-year fall in deaths, the number of
attacks rose from 4,458 in 2020 to 5,226 in 2021, a 17 per cent increase and the highest number
of attacks recorded since 2007, largely due to violence in the Sahel region and instability in
country such as Afghanistan. Although there was a substantial improvement in Nigeria and sub-
Saharan Africa, overall the Sahel recorded a noticeable deterioration, with Burkina Faso, Mali
and Niger all recording substantial increases in terrorism deaths in 2021. Six of the eight
countries in the Sahel are amongst the ten most impacted countries for terrorism in sub-Saharan
Africa. Since COVID-19 was declared a global pandemic by the World Health Organization
(WHO) in March 2020, a rise in terrorism was anticipated. However, the evidence suggests that
the pandemic has had very little impact on terrorism in 2020 and 2021. Despite this, the COVID-
19 pandemic has presented new and distinct counter-terrorism challenges. In particular, the
increase of government deficits caused by increased public spending during the pandemic
continues to impact on counterterrorism budgets. It is still to be seen whether the economic
impact of COVID on countries that are already fragile will increase frustrations with
governments, aggravating existing political tensions and possibly leading to further civil unrest.
The Global Terrorism Index (GTI) found that slightly more countries improved then
deteriorated. In 2021, 25 countries recorded reductions in terrorism deaths, while 21 countries
recorded increases and 117 countries recorded no change in the number of deaths. One hundred
and five countries did not record any terrorism incidents. The GTI assesses four measures, the
number of attacks, deaths, wounded and hostages, using a 5 year weighting system to determine
the level of impact for any given year. The weighting system allows for the impact of the
lingering effect of terrorism on a country’s psyche. Although the number of deaths from
terrorism has remained fairly constant for the last four years it is still a major global threat. The
number of terrorism incidents remains substantially higher than a decade ago, while there has
been a slight increase in the number of countries experiencing terrorism, from 43 in 2020 to 44 in
2021.

Dept. of E&CE, SVCE, Bengaluru Page 22


GLOBAL TERRORISM 2021-2022

CONCLUSION
The Administration is aggressively implementing the objectives of the President’s National
Strategy for Homeland Security and National Strategy for Combating Terrorism, rooting out
terrorism abroad, forming international coalitions, equipping first responders with additional
tools, enhancing intelligence capabilities, cutting off terrorist financing, securing our borders and
transportation systems, enhancing response capabilities, developing medical countermeasures,
and adding protective measures for critical infrastructure. All Federal agencies are integrating
their efforts better than ever before and coordinating with state, local, and private entities to
prevent future terrorist attacks on American soil.

International and domestic efforts have led to the removal of terrorist leaders and personnel and
the disruption of numerous plots. Iraq and Afghanistan no longer provide state-sponsored or
government-supported sanctuary and training grounds for terrorist groups. Initiatives by the
United States have provided good governance, health and education, and given more countries
the opportunity to be active participants in the global economy, strengthening states that
terrorists might otherwise seek to exploit.

The United States and its allies have made great progress in the Global War on Terrorism, but we
must maintain our dedication and vigilance. While many terrorists have been brought to justice,
others are plotting to attack us. We will remain on the offensive, preemptively stopping terrorists
seeking to do harm against the United States, its citizens and partners, and creating an
international environment that is inhospitable to terrorists and all those who support them.
Victory against terrorism will occur through the sustained efforts of a global coalition dedicated
to ridding the world of those who seek to destroy our freedom and way of life.

Dept. of E&CE, SVCE, Bengaluru Page 23


GLOBAL TERRORISM 2021-2022

REFERENCES

[1] S. Sayad. Naïve Bayesian, from Predicting the Future. [Online],

[2] E.Fix and J.Hodges. Discriminatory analysis: nonparametric discrimination: Consistency


properties. PsycEXTRA Dataset, (1951)

[3] https://cogsci.yale.edu/sites/default/files/files/Thesis2018Peng.pdf

[4] Mohammed, D. Y., & Karabatak, M. (2018, March). Terrorist attacks in Turkey: An
evaluate of terrorist acts that occurred in 2016. In 2018 6 th International Symposium on
Digital Forensic and Security (ISDFS) (pp. 1-3).

[5] Bang, J., Basuchoudhary, A., David, J., & Mitra, A. (2018). Predicting terrorism: a
machine learning approach.

[6] Mathews, T., & Sanders, S. (2019). Strategic and experimental analyses of conflict and
terrorism. Public Choice, 179(3-4), 169-174.

[7] Ravenscroft, I. (2019). Terrorism, religion and self-control: An unexpected connection


between conservative religious commitment and terrorist efficacy. Terrorism and
Political Violence, 1-16

[8] Khalifa, N. E. M., Taha, M. H. N., Taha, S. H. N., & Hassanien, A.E. (2019, March).
Statistical Insights and Association Mining for Terrorist Attacks in Egypt. In
International Conference on Advanced Machine Learning Technologies and Applications
(pp. 291-300). Springer, Cham

[9] Wheatley, W., Robbins, J., Hunter, L. Y., & Ginn, M. H. (2019). Terrorism’s effect on
Europe’s centre-and far-right parties. European Political Science, 1-22.

[10] Klenka, M. (2019). Major incidents that shaped aviation security. Journal of
Transportation Security, 1-18.

[11] Guo, W., Gleditsch, K., & Wilson, A. (2018). Retool AI to forecast and limit wars.

[12] Hao, M., Jiang, D., Ding, F., Fu, J., & Chen, S. (2019). Simulating Spatio-Temporal
Patterns of Terrorism Incidents on the Indochina Peninsula with GIS and the Random Forest
Method. ISPRS International Journal of Geo-Information, 8(3), 133.

[13] Sarah; Pollock Feuer, David, “Terrorism in Europe: The Moroccan Connection | The
Washington Institute.” Accessed February 22, 2022. https://www.
washingtoninstitute.org/policy-analysis/terrorism-europe-moroccanconnection.

Dept. of E&CE, SVCE, Bengaluru Page 24


GLOBAL TERRORISM 2021-2022

[14] El Moussaoui El Ajlaoui, "Security Challenges and Issues in the SaheloSaharan Region:
The Morocco Perspective," (July 2016), p.5-6.

[15] Krista London Couture, “A gendered approach to countering violent extremism: lessons
learned from women in peacebuilding and conflict prevention applied successfully in
Bangladesh and Morocco”, (Center for 21st Century Security and Intelligence at Brookings,
2014)., p. ix-x

[16] Ihssane Guennoun, "India and Morocco’s New Cooperation Areas: Focusing on
Security and Preventing Violent Extremism," (2019). Accessed on 22 February 2022,
https://www.policycenter.ma/sites/default/files/2021-01/PB%20-%2026-19%20%28Ihssane
%20Geunnoun%29 .pdf

[17] Michael Sauers, "DGST, Italian Intelligence Team Up to Arrest Senior Moroccan ISIS
Terrorist," (July 10 2021). https://www.moroccoworldnews. com/2021/07/343343/dgst-
italian-intelligence-team-up-to-arrest-seniormoroccan-isis-fighter.

Dept. of E&CE, SVCE, Bengaluru Page 25

You might also like