Professional Documents
Culture Documents
Global Terriosm Report
Global Terriosm Report
“Jnana Sangama’’Belagavi-590018
Internship Report on
A Machine Learning Approach for
Global Terrorism Analysis
Submitted in partial fulfillment for the award of Degree of
Bachelor of Engineering
Submitted by
K. N .DEEPSHI (1VE17EC045)
Under the guidance of
ACY: 2021-22
Sri Venkateshwara College of Engineering
Department of Electronics & Communication Engineering
CERTIFICATE
Certified that the internship work entitled “MACHINE LEARNING” was carried
out by Ms. K N DEEPSHI (1VE17EC045) who is a bonafide student of VIII
Semester Electronics & Communication Engineering, Sri Venkateshwara College
of Engineering. This is in partial fulfillment for the award of Bachelor of
Engineering of Visvesvaraya Technological University, Belagavi, during the year
2021-2022. It is certified that all corrections/suggestions indicated for internship
internal assessment have been incorporated in there port. The internship report has
been approved as it satisfies the academic requirements in the respect of seminar
work prescribed for the said degree.
CERTIFICATE
ACKNOWLEDGEMENT
My most sincere and grateful thanks to SRI VENKATESHWARA COLLEGE OF
ENGINEERING, for giving an opportunity to pursue the B.E in Electronics & Communication
Engineering and thus helping to share career. First and foremost, I would like to express my
gratitude to Dr. Nageswara Guptha M, PRINCIPAL, SVCE, Bengaluru, for his support in
bringing this internship to completion.
I would like to extend our sincere thanks to Dr. Jijesh J J, Associate Professor and Head,
Department of Electronics and Communication Engineering, SVCE, Bengaluru, for his
suggestion which helped me to complete the internship.
I would also like to sincere thanks to internal guide Prof. Sarala T, Assistant Professor,
Department of Electronics and Communication Engineering, SVCE, Bangalore, for his
guidance and support in bringing this internship to completion.
I consider it as a privilege to express our sincere gratitude and respect to Mrs. Uma N, Knowx
Innovation (P) Ltd for being our guide, for his integral and being constant source of
inspiration throughout the project.
Word cannot express the immense gratitude I have for parents who has been instrumental in
shaping my career. I am thankful to all our lectures and friends who have been the sources of
inspiration to all endeavors.
Yours Sincerely,
K N DEEPSHI
(1VE17EC045)
COMPANY PROFILE
Our strength in embedded systems software and hardware design and development makes us
one stop partner for product development and R&D and are capable of handling the entire
development cycle from concept to final product realization.
Vision
Mission
We at Knowx help you discover exciting opportunities to work on leading edge
technologies like Internet of Things, Artificial intelligence, Cloud, Mobility and Data
analytics. Take your career to new pinnacles and realize your dream.
Team
KNOWX Innovation has 4 major divisions in the organization:
Services
Chapter 1
INTRODUCTION
Terrorist attacks are spreading on a great pace across the world. As per the United Nations
definition of Terrorism,” any action with a political goal that is intended to cause death or serious
bodily harm to civilians” [1]. Around 22 thousand events occurred globally in the last year,
causing over 18 thousand casualties [2]. The factors leading to terrorism change over time since
they are dependent upon multiple political and social reasons. Apart from predicting the son
behind the attack, identification of the responsible agencies is also difficult. There has been a
dearth he information regarding patterns of widespread terrorist behavior The existing analyses
are either case studies or quantitative methods such as regression analysis. The former of these is
specific to certain events, while the latter approach is restricted to interviews of civilians
impacted by the attack. Most of these analyses depend on factors such as weapons used for the
attacks and the number of people harm another type of analysis includes investigation of unusual
patterns in individual behaviors or questioning detainees to acquire outing. The current research
is focused on finding out the correlation between terrorism and its causal factors. Existing efforts
have not been good enough for prediction. Machine learning approaches can ad in predicting the
likelihood of a terrorist attack, given the required data. The results of this work can help the
security agencies and policymakers eradicate terrorism by taking relevant and effective
measures.
This paper provides an approach to analyzing terrorism region and country with the machine
learning techniques terrorism specific pledged to fetch conclusions about terrorist behavior
patterns. Through analysis of events using GTD, six supervised machine learning models
(Gaussian Naïve Bayes, Linear Discriminant Analysis, k-Nearest Neighbors, Support Vector
Machines, Decision Tree, and Logistic Regression) were built and evaluated on their
performances. The rest paper is organized is as follows: Related work is presented in Section II.
Analysis of data and prediction models are described in Section III. Results are discussed in
Section IV.
1.1Motivation
Terrorist attacks are spreading on a great pace across the world. As per the United Nations
definition of Terrorism,” any action with a political goal that is intended to cause death or serious
bodily harm to civilians”. In the last year, around 22 thousand events occurred globally, causing
over 18 thousand casualties.
Data science, machine learning and artificial intelligence are some of the top trending topics in
the tech world today. Data mining and Bayesian analysis are trending and this is adding the
demand for machine learning. This tutorial is your entry into the world of machine learning.
Machine learning is a discipline that deals with programming the systems so as to make them
automatically learn and improve with experience. Here, learning implies recognizing and
understanding the input data and taking informed decisions based on the supplied data. It is very
difficult to consider all the decisions based on all possible inputs.
To solve this problem, algorithms are developed that build knowledge from a specific data and
past experience by applying the principles of statistical science, probability, logic, mathematical
optimization, reinforcement learning, and control theory.
1.2 Objectives
The factors leading to terrorism change over time since they are dependent upon multiple
political and social reasons.
Hence the detecting of global terrorism is necessary for saving the people of the country
against all the terror attacks.
Language processing
Pattern recognition
Games
Data mining
Expert systems
Robotics
1.4 Key features with scope of the features or overall scope of the work
Machine learning approaches can ad in predicting the likelihood of a terrorist attack, given the
required data. The results of this work can help the security agencies and policy makers to
eradicate terrorism by taking relevant and effective measures.
1.5 Advantages
1.6 Disadvantages :
Chapter 2
Machine Learning
2.1 Methodology
By centering the above issues, comes the need to create and plan an ease water quality observing
framework that can screen water quality progressively utilizing IoT environment.
then design is the act of taking the marketing information and creating the design of the
product to be manufactured. Systems design is therefore the process of defining and
Dataset: The dataset of global terrorism is imported to our Naïve Bayes algorithm.
Data Preprocessing: The dataset data is preprocessed and converted into clean dataset.
Applying algorithm: The Naïve Bayes algorithm is applied for the global terrorism analysis.
The dataset of global terrorism is imported. The dataset is csv file. The dataset preprocessing is
done to convert dataset into clean dataset.
Dataset Preprocessing
Preprocessing
Input Output
The algorithm is applied for the global terrorism analysis.The global terrorism record is
analysed.
A class diagram in the Unified Modeling Language (UML) is a type of static structure
diagram that describes the structure of a system by showing the system's classes, their
attributes, operations (or methods), and the relationships among objects. . It is used for
general conceptual modeling of the structure of the application, and for detailed modeling,
translating the models into programming code.
In the Unified Modeling Language, activity diagrams are intended to model both computational
and organizational processes (i.e., workflows), as well as the data flows intersecting with the
related activities.[2][3] Although activity diagrams primarily show the overall flow of control,
they can also include elements showing the flow of data between activities through one or more
data stores [ citation model]. Activity diagrams can be regarded as a form of a
structured flowchart combined with a traditional data flow diagram. Typical flowchart
techniques lack constructs for expressing concurrency.[5]
However, the join and split symbols in activity diagrams only resolve this for simple cases; the
meaning of the model is not clear when they are arbitrarily combined with decisions or loops.
[citation needed]
.
In the Unified Modeling Language, activity diagrams are intended to model both computational
and organizational processes (i.e., workflows), as well as the data flows intersecting with the
related activities.
A state diagram is a type of diagram used in computer science and related fields to describe the
behavior of systems. State diagrams require that the system described is composed of a finite
number of states.
State diagrams require that the system described is composed of a finite number of states;
sometimes, this is indeed the case, while at other times this is a reasonable abstraction
sometimes, this is indeed the case, while at other times this is a reasonable abstraction. Many forms
of state diagrams exist, which differ slightly and have different semantics.
A data flow diagram is a graphical representation of the "flow" of data through an information
system, modeling its process aspects. Often they are a preliminary step used to create an
overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design). The DFD is also called as bubble chart. It is
a simple graphical formalism that can be used to represent a system in terms of the input data to
the system, various processing carried out on these data, and the output data is generated by the
system. For each data flow, at least one of the endpoints (source and / or destination) must exist
in a process. The refined representation of a process can be done in another data-flow diagram,
which subdivides this process into sub-processes.
Data-flow diagrams can be regarded as inverted Petri nets, because places in such networks
correspond to the semantics of data memories. Analogously, the semantics of transitions from
Petri nets and data flows and functions from data-flow diagrams should be considered
equivalent.
The data-flow diagram is a tool that is part of structured analysis and data modelling. When
using UML, the activity diagram typically takes over the role of the data-flow diagram. A special
form of data-flow plan is a site-oriented data-flow plan.
2.4.5.1 Level-1
The main program contains login and register, if the user is having is having an account they can
login otherwise they to register to create a new account.
2.4.5.2 Level-2
If you click on the register button fields will be open (username, password, emails, and phones) .
After fill with a fields you can signup. i will show register done then it will open lothe gin page.
If you click on the register button fields will be open (username, password, emails, and phones) .
After fill with a fields you can sign up. I will show register done then it will open lothe gin page.
2.4.5.3 Level-3
The login page will be displayed then we should enter a username and password (wrong
password).
I will show error, we have give a exact username and password program will be executed.
2.6 Algorithm
This is similar to the multinomial naive bayes but the predictors are boolean
variables. The parameters that we use to predict the class variable take up only
values yes or no, for example if a word occurs in the text or not.
Gaussian Naive Bayes:
When the predictors take up a continuous value and are not discrete, we assume that
these values are sampled from a Gaussian distribution.
Over the past two years, the Obama administration has begun to formalize a so-called
“disposition matrix” for suspected terrorists abroad: a continuously evolving database that
spells out the intelligence on targets and various strategies, including contingencies, for
handling them. Although the government has not spelled out the steps involved in deciding how
to treat various terrorists, a look at U.S. actions in the past makes it possible to reverse-engineer
a rough decision tree for certain types of suspects.
To summarize Chapter 2, the Proposed Project Work it speaks about the Methodology, which
gives the details about how we proceed with the project work the different phases in it and
the implementation techniques and also steps involved in the working of project protype.
Chapter 3
COMPONENTS REQUIRED
1.1 System Requirement Specification
A System Requirements Specification (SRS) (also known as a Software Requirements
Specification) is a document or set of documentation that describes the features and behavior of
a system or software application.
The current research is focused on finding out the correlation between terrorism and its causal
factors. Existing efforts have not been good enough for prediction. Machine learning
approaches can ad in predicting the likelihood of a terrorist attack, given the required data. The
results of this work can help the security agencies and policymakers to eradicate terrorism by
taking relevant and effective measures.
Hence there is an approach to analyzing terrorism region and country with the machine learning
techniques and terrorism specific knowledge to fetch conclusions about terrorist behavior
patterns.
The particular necessities are user interfaces. The outside clients are the customers.
Every one of the customers can utilize this product for the ordering and looking.
Hardware Interfaces: The outside equipment interface utilized for ordering and looking is
the PCs of the customers. PCs might be portable PCs with remote LAN as the web
association gave will be remote.
Performance Prerequisites: The PC's utilized must be at least 4 machine with the goal that
Non utilitarian necessities are the capacities offered by the framework. It incorporates time
imperative and requirement on the advancement procedure and models. The non useful
Speed: The framework ought to prepare the given contribution to yield inside fitting time.
Ease of utilization: The product tought to be easy to understand. At that point the clients can
Reliability: The rate of disappointments ought to be less then just the framework is more
solid.
spite of the fact that engineering free working frameworks and applications exist, most
should be recompiled to keep running on another design.
The energy of the focal preparing unit (CPU) is a central framework necessity for any
product. Most programming running on x86 engineering characterizes preparing power as
the model and the clock speed of the CPU. Numerous different highlights of a CPU that
impact its speed and power, similar to transport speed,storage, and MIPS are frequently
overlooked. This meaning of energy is regularly wrong, as AMD Intel Pentium CPUs at
comparative clock speed frequently have distinctive throughput speeds.
• 10GB HDD(min)
• 128 MB RAM(min)
These necessities or requirements are for the most part excluded in the product establishment
Pycharm
opencv
To summarize Chapter 4, it speaks about the components required, which gives the details
Chapter 4
Work Carried Out
Python is a popular programming language. It was created by Guido van Rossum, and
released in 1991.
It is used for:
• software development,
• system scripting.
• Python can connect to database systems. It can also read and modify files.
• Python can be used to handle big data and perform complex mathematics.
• Python can be used for rapid prototyping, or for production-ready software development.
Why Python?
• Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.).
• Python has syntax that allows developers to write programs with fewer lines than other.
• Python runs on an interpreter system, meaning that code can be executed as soon as it is
Advantages of Python
• Extensive support libraries (Numpy for numerical calculations, Pandas for data analytics
etc.)
• Easy to learn
• Object-oriented language
Week 1:
3. This exercise helped us understand the importance of Python , input/output basics and
Week 2:
3. We were taught about basic functions of Python like of variables, displaying contents.
Week 3:
Week 4:
Week 5:
To summarize Chapter 4, the Plan of the Work it speaks about the what all the works are
carried out, which gives the details about how we proceed with the work the different phases
in it and the implementation technology description and also steps involved in the working of
pro type and task performed.
The Naïve Bayes algorithm can be applied to our code for the analysis of the global terrorism
facts. Thus it gives the accuracy as an output. Hence the global terrorism analysis is done in our
project.
The total number of deaths from terrorism declined in 2021, falling by 1.2 per cent to 7,142
(Figure 1.1). This is the fourth consecutive year where deaths from terrorism remained fairly
constant. However, there has been a 33 per cent reduction since the peak in 2015 when 10,699
people were killed in terrorist attacks. The primary driver of this reduction in 2021 has been a
fall in the intensity of conflict in the Middle East, and the subsequent decline of the Islamic State
(IS) in Iraq and Syria. However, increases in the number of deaths were recorded in three of the
nine regions - Asia-Pacific, North America and South Asian regions, which increased by 303, 66
and eight per cent respectively. North America was off a very low base, recording three deaths
from terrorism in 2020 and five in 2021. Despite the year-on-year fall in deaths, the number of
attacks rose from 4,458 in 2020 to 5,226 in 2021, a 17 per cent increase and the highest number
of attacks recorded since 2007, largely due to violence in the Sahel region and instability in
country such as Afghanistan. Although there was a substantial improvement in Nigeria and sub-
Saharan Africa, overall the Sahel recorded a noticeable deterioration, with Burkina Faso, Mali
and Niger all recording substantial increases in terrorism deaths in 2021. Six of the eight
countries in the Sahel are amongst the ten most impacted countries for terrorism in sub-Saharan
Africa. Since COVID-19 was declared a global pandemic by the World Health Organization
(WHO) in March 2020, a rise in terrorism was anticipated. However, the evidence suggests that
the pandemic has had very little impact on terrorism in 2020 and 2021. Despite this, the COVID-
19 pandemic has presented new and distinct counter-terrorism challenges. In particular, the
increase of government deficits caused by increased public spending during the pandemic
continues to impact on counterterrorism budgets. It is still to be seen whether the economic
impact of COVID on countries that are already fragile will increase frustrations with
governments, aggravating existing political tensions and possibly leading to further civil unrest.
The Global Terrorism Index (GTI) found that slightly more countries improved then
deteriorated. In 2021, 25 countries recorded reductions in terrorism deaths, while 21 countries
recorded increases and 117 countries recorded no change in the number of deaths. One hundred
and five countries did not record any terrorism incidents. The GTI assesses four measures, the
number of attacks, deaths, wounded and hostages, using a 5 year weighting system to determine
the level of impact for any given year. The weighting system allows for the impact of the
lingering effect of terrorism on a country’s psyche. Although the number of deaths from
terrorism has remained fairly constant for the last four years it is still a major global threat. The
number of terrorism incidents remains substantially higher than a decade ago, while there has
been a slight increase in the number of countries experiencing terrorism, from 43 in 2020 to 44 in
2021.
CONCLUSION
The Administration is aggressively implementing the objectives of the President’s National
Strategy for Homeland Security and National Strategy for Combating Terrorism, rooting out
terrorism abroad, forming international coalitions, equipping first responders with additional
tools, enhancing intelligence capabilities, cutting off terrorist financing, securing our borders and
transportation systems, enhancing response capabilities, developing medical countermeasures,
and adding protective measures for critical infrastructure. All Federal agencies are integrating
their efforts better than ever before and coordinating with state, local, and private entities to
prevent future terrorist attacks on American soil.
International and domestic efforts have led to the removal of terrorist leaders and personnel and
the disruption of numerous plots. Iraq and Afghanistan no longer provide state-sponsored or
government-supported sanctuary and training grounds for terrorist groups. Initiatives by the
United States have provided good governance, health and education, and given more countries
the opportunity to be active participants in the global economy, strengthening states that
terrorists might otherwise seek to exploit.
The United States and its allies have made great progress in the Global War on Terrorism, but we
must maintain our dedication and vigilance. While many terrorists have been brought to justice,
others are plotting to attack us. We will remain on the offensive, preemptively stopping terrorists
seeking to do harm against the United States, its citizens and partners, and creating an
international environment that is inhospitable to terrorists and all those who support them.
Victory against terrorism will occur through the sustained efforts of a global coalition dedicated
to ridding the world of those who seek to destroy our freedom and way of life.
REFERENCES
[3] https://cogsci.yale.edu/sites/default/files/files/Thesis2018Peng.pdf
[4] Mohammed, D. Y., & Karabatak, M. (2018, March). Terrorist attacks in Turkey: An
evaluate of terrorist acts that occurred in 2016. In 2018 6 th International Symposium on
Digital Forensic and Security (ISDFS) (pp. 1-3).
[5] Bang, J., Basuchoudhary, A., David, J., & Mitra, A. (2018). Predicting terrorism: a
machine learning approach.
[6] Mathews, T., & Sanders, S. (2019). Strategic and experimental analyses of conflict and
terrorism. Public Choice, 179(3-4), 169-174.
[8] Khalifa, N. E. M., Taha, M. H. N., Taha, S. H. N., & Hassanien, A.E. (2019, March).
Statistical Insights and Association Mining for Terrorist Attacks in Egypt. In
International Conference on Advanced Machine Learning Technologies and Applications
(pp. 291-300). Springer, Cham
[9] Wheatley, W., Robbins, J., Hunter, L. Y., & Ginn, M. H. (2019). Terrorism’s effect on
Europe’s centre-and far-right parties. European Political Science, 1-22.
[10] Klenka, M. (2019). Major incidents that shaped aviation security. Journal of
Transportation Security, 1-18.
[11] Guo, W., Gleditsch, K., & Wilson, A. (2018). Retool AI to forecast and limit wars.
[12] Hao, M., Jiang, D., Ding, F., Fu, J., & Chen, S. (2019). Simulating Spatio-Temporal
Patterns of Terrorism Incidents on the Indochina Peninsula with GIS and the Random Forest
Method. ISPRS International Journal of Geo-Information, 8(3), 133.
[13] Sarah; Pollock Feuer, David, “Terrorism in Europe: The Moroccan Connection | The
Washington Institute.” Accessed February 22, 2022. https://www.
washingtoninstitute.org/policy-analysis/terrorism-europe-moroccanconnection.
[14] El Moussaoui El Ajlaoui, "Security Challenges and Issues in the SaheloSaharan Region:
The Morocco Perspective," (July 2016), p.5-6.
[15] Krista London Couture, “A gendered approach to countering violent extremism: lessons
learned from women in peacebuilding and conflict prevention applied successfully in
Bangladesh and Morocco”, (Center for 21st Century Security and Intelligence at Brookings,
2014)., p. ix-x
[16] Ihssane Guennoun, "India and Morocco’s New Cooperation Areas: Focusing on
Security and Preventing Violent Extremism," (2019). Accessed on 22 February 2022,
https://www.policycenter.ma/sites/default/files/2021-01/PB%20-%2026-19%20%28Ihssane
%20Geunnoun%29 .pdf
[17] Michael Sauers, "DGST, Italian Intelligence Team Up to Arrest Senior Moroccan ISIS
Terrorist," (July 10 2021). https://www.moroccoworldnews. com/2021/07/343343/dgst-
italian-intelligence-team-up-to-arrest-seniormoroccan-isis-fighter.