SlideShare a Scribd company logo
Classifying Shooting Incident Fatality in New York project presentation
Classifying Shooting
Incident Fatality in
New York City
leveraging machine learning for predicting shooting incident fatalities.
Presented by Indhu Reddy
Introduction
The public safety sector is evolving rapidly, influenced by technological advancements,
changing urban dynamics, and a growing need for data-driven decision-making.
Shooting incidents, particularly the fatal ones, pose significant challenges and
opportunities for law enforcement agencies. When a shooting incident results in a fatality,
it has a profound impact on community safety, public trust, and the strategic allocation of
police resources.
Machine learning, with its predictive capabilities, offers a transformative approach to
understanding and mitigating the challenges posed by shooting incidents.
Through data-driven insights and predictive modeling, this presentation aims to showcase my Machine
Learning Capstone Project focused on predicting shooting incident fatality in New York City.
Why Public Safety Domain?
The public safety sector is a unique blend of community well-being, technology, and regulatory
frameworks, presenting its own set of distinct challenges and opportunities. I chose the Public
Safety Domain for my Capstone Project because:
Community Impact: Public safety directly affects the quality of life in communities.
Understanding and predicting incidents can help save lives and enhance community trust.
Confidentiality: Handling sensitive incident data requires utmost care. Ensuring data privacy
and security while analyzing it is a complex but crucial task.
Diverse Incidents: Public safety incidents vary widely. Developing models to manage and
predict such a diverse range of incidents adds another layer of complexity.

Recommended for you

A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...

Nowadays, the concept of big data grows incessantly ; recent researches proved that 90% of the whole data existed on the web had been created in l ast two years. However, this growing bumped by many critical challenges resides generall y in security level; the users care about how could providers protect their privacy on their data. Access control, cryptography, and de- identification are the main search areas grouped un der a specific domain known as Privacy Preserving Data Publishing. In this paper, we bring in suggestion a new model for access control over big data using digital signature and c onfidence interval; we first introduce our work by presenting some general concepts used to bu ild our approach then presenting the idea of this report and finally we evaluate our system b y conducting several experiments and showing and discussing the results that we got

access controlnumeric signaturestandard deviation
Visual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in ItalyVisual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in Italy

The document describes a visual analytics project analyzing traffic collision statistics in Italy. It uses an interactive dashboard with an Italy map, histograms, and sliders to filter data by year, region, and other factors. Principal component analysis is applied to reduce the dataset dimensions before representation. The dashboard allows users to gain insights through interactive exploration of quantitative relationships between variables like accident rates in different regions.

algorithmsd3d3.js
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...

This document discusses machine learning techniques for classifying medical datasets. It provides an overview of various artificial intelligence and machine learning algorithms that have been applied for medical dataset classification, including artificial neural networks, support vector machines, k-nearest neighbors, and decision trees. The document surveys works that have used these techniques for diseases like breast cancer, heart disease, and diabetes. It also describes common pre-processing steps for medical datasets like data normalization and feature selection methods like F-score and PCA that are used to select the most important features for classification. The classification algorithms are then evaluated based on accuracy metrics like sensitivity, specificity, and accuracy.

irjet
Project’s Significance and Benefits to Law Enforcement
1 Enhanced Community Safety:
Anticipating fatal incidents allows for proactive strategies,
improving response times and community safety.
2 Resource Optimization:
Predicting and mitigating fatal incidents is cost-effective,
ensuring efficient allocation and utilization of police resources.
3 Risk Mitigation:
Identifying potential fatal incidents mitigates risks, enabling
preventive measures and strategic interventions.
4 Market Competitiveness:
Predictive incident management positions law enforcement
agencies as proactive and community-centric, offering a
competitive edge through improved public trust and safety.
5 Long-Term Community Trust:
By predicting and addressing fatal incidents, my project contributes
not only to public safety but also to the broader objectives of law
enforcement, fostering community trust and ensuring long-term
societal well-being.
Dataset Information
Column Name Description
INCIDENT_KEY Unique identifier for each incident
OCCUR_DATE Date of the incident
OCCUR_TIME Time of the incident
BORO Borough where the incident occurred
LOC_OF_OCCUR_DESC Description of the location of occurrence
PRECINCT
Police precinct where the incident was
reported
JURISDICTION_CODE Jurisdiction code for the incident
LOC_CLASSFCTN_DESC Location classification description
LOCATION_DESC Detailed location description
STATISTICAL_MURDER_FLAG Indicator if the incident was a murder
PERP_AGE_GROUP Age group of the perpetrator
PERP_SEX Sex of the perpetrator
PERP_RACE Race of the perpetrator
VIC_AGE_GROUP Age group of the victim
VIC_SEX Sex of the victim
VIC_RACE Race of the victim
X_COORD_CD X-coordinate of the incident location
Y_COORD_CD Y-coordinate of the incident location
Latitude Latitude of the incident location
Longitude Longitude of the incident location
Lon_Lat Combined longitude and latitude
Features/Columns: The dataset is
characterized by a diverse set of features,
each providing valuable insights into
shooting incidents, their locations, and
outcomes. In total, there are 21
features/columns that form the basis of our
predictive modeling.
Number of records: Our dataset
comprises a robust collection of data,
consisting of over 23,000 records. Each
record represents a unique shooting
incident, contributing to the richness and
depth of our analysis.
Source of the Data: The dataset is sourced
from the New York Police Department
(NYPD), provided by the institute, ensuring
reliability and relevance. The data's origin
plays a crucial role in shaping the context
and ensuring that our analysis is grounded
in real-world scenarios and industry
dynamics.
Here are the key details about the dataset used in this project:
1. Initial Data Cleaning
First, we made sure there were no null values and duplicates in
the dataset
 Null Values: Verified that there were no null values in the
dataset.
 Duplicates: Ensured there were no duplicate records,
maintaining the integrity of our data.
2. Feature Evaluation
 Column Relevance: We evaluated all columns to
determine their usefulness for our analysis.
 Dropped Columns: Columns like “INCIDENT_KEY” and
“LOC_OF_OCCUR_DESC” weren't contributing much to
the predictions, so we decided to drop them during
preprocessing.
3. Handling Categorical Variables
Categorical to Numerical:
The " STATISTICAL_MURDER_FLAG" column was categorical
variables. We converted these categorical features into
numerical format using label encoding to make them
compatible with our model.
Preprocessing
Exploratory Data Analysis (EDA)
EDA Insights: ( Visualizations)
Visualizations were essential in providing a clear representation of the data. They offered insights into patterns and helped identify
factors contributing to fatal shooting incidents.
• Feature Distribution: Analyzed the distribution of features to understand their characteristics.
• Correlation Analysis: Highlighted correlations between features using Heatmaps
• PCA Scatter Plot: Visualized the data before and after removal of outliers.
By performing a thorough EDA, we ensured our dataset was ready for predictive modeling, providing a solid foundation for developing
our machine learning model.
Columns Worked With:
PRECINCT, JURISDICTION_CODE, STATISTICAL_MURDER_FLAG, X_COORD_CD, Y_COORD_CD, Latitude, Longitude

Recommended for you

Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...

Pattern recognition is one of the prime concepts in current technologies in both private and public sectors. The analysis and recognition of two or more patterns is a complex task due to several factors. The consideration of two or more patterns requires huge space for keeping the storage media as well as computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper proposes pattern recognition in multimodal authentication system with the use of vector logic and makes the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion and then various key sizes will be extracted using LU factorization approach. The selected keys will be combined using vector logic, which introduces a memory model often called Context Dependent Memory Model (CDMM) as computational model in multimodal authentication system that gives very accurate and very effective outcome for authentication as well as verification. In the verification step, Mean Square Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed model and the performance analysis will be presented.

normalized correlation (nc)
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate

This document describes a proposed system to use machine learning methods to predict crime rates and types of crimes in specific areas based on historical crime data. The system would analyze crime data collected from websites including date, location, and crime type to identify patterns. Machine learning algorithms would be trained on the data to build predictive models. The goal is to help law enforcement agencies more quickly detect, resolve, and prevent crimes by predicting where and what types of crimes may occur based on the characteristics of past crimes.

irjet
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...

Data mining is used in various domains of research to identify a new cause for tan effect in the society over the globe. This article includes the same reason for using the data mining to identify the Accident Occurrences in different regions and to identify the most valid reason for happening accidents over the globe. Data Mining and Advanced Machine Learning algorithms are used in this research approach and this article discusses about hyperline, classifications, pre-processing of the data, training the machine with the sample datasets which are collected from different regions in which we have structural and semi-structural data. We will dive into deep of machine learning and data mining classification algorithms to find or predict something novel about the accident occurrences over the globe. We majorly concentrate on two classification algorithms to minify the research and task and they are very basic and important classification algorithms. SVM (Support vector machine), CNB Classifier. This discussion will be quite interesting with WEKA tool for CNB classifier, Bag of Words Identification, Word Count and Frequency Calculation.

accidentsbag of wordsclassifier
Visualizations
• Feature Distribution: The histograms display the
distribution of key numerical columns in the dataset,
specifically 'PRECINCT', 'X_COORD_CD', and
'Y_COORD_CD'.
• PRECINCT: This histogram shows the distribution of
shooting incidents across different police precincts in New
York City. It helps in identifying precincts with higher or
lower frequencies of incidents.
• X_COORD_CD and Y_COORD_CD: These histograms
illustrate the distribution of the geographical coordinates of
shooting incidents. They provide insights into the spatial
spread and concentration of incidents based on their x and
y coordinates.
Visualizations
Boxplots are essential for visualizing the distribution of numerical features and identifying outliers within the dataset.
Outliers can significantly affect the performance of machine learning models, so it is crucial to detect and handle them
appropriately.
Observations
PRECINCT: The precinct column shows a fairly even distribution with no significant outliers.
JURISDICTION_CODE: The jurisdiction code column has a few noticeable outliers which could indicate special cases or
anomalies in the dataset.
X_COORD_CD and Y_COORD_CD: Both X coordinate column show a large number of outliers. This might indicate data
entry errors or rare but valid occurrences. where as in Y coordinate there aren’t outliers seen.
Latitude and Longitude: The longitude columns also display several outliers, which could be due to incorrect data entries
or actual rare geographical points. where as in latitude column there aren’t outliers seen.
Visualizations
By leveraging correlation analysis through a heatmap, we gain valuable insights into the interrelationships between
features, guiding us in building a more robust and accurate predictive model.
Observations
1. PRECINCT and Y_COORD_CD/Latitude: There is a strong negative correlation between PRECINCT and
Y_COORD_CD/Latitude, indicating that certain precincts are more associated with specific latitude positions.
2. X_COORD_CD and Longitude: These features have a perfect positive correlation, as expected, since they represent
the same spatial dimension.
3. Other Features: Most other features show low or moderate correlations with each other, suggesting that they
provide unique information to the model.
Visualizations
PCA (Principal Component Analysis): PCA was used to reduce the dimensionality of the dataset to two principal
components (PCA1 and PCA2) for easy visualization.
Visualization: The scatter plot visualizes the data points in the new PCA space, highlighting outliers in red and
inliers in blue.
Observations
Before Removal: The left plot shows the dataset with outliers included. blue points represent the outliers detected,
while red points represent the inliers.
-Outliers can be observed scattered around the inliers, indicating potential anomalies or errors in the data.
After Removal: The right plot shows the dataset after removing the outliers.
- The cleaned data (in blue) appears more compact and consistent, with fewer scattered points, indicating a more
reliable dataset for model training.

Recommended for you

AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP

The document presents a study on an efficient face recognition method employing support vector machines (SVM) and biomimetic uncorrelated local difference projection (BU-LDP). The study proposes using BU-LDP, which is based on uncorrelated local projection but uses a different neighborhood coefficient calculation approach inspired by human perception. Experimental results on several datasets show that BU-LDP and its kernel variant KBU-LDP outperform state-of-the-art methods for face recognition. Future work will focus on addressing the "one sample problem" and applying the approach to unlabeled data.

irjet
A Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality IndicatorsA Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality Indicators

The document summarizes a research paper that empirically validated several object-oriented design metrics proposed by Chidamber and Kemerer as indicators of fault-prone classes. The study analyzed 6 metrics on 180 classes from a system. Univariate analysis found 5 metrics to be significantly correlated with fault probability. Multivariate analysis using these 5 metrics achieved better prediction of faulty classes than models using traditional code metrics. The research validated that these OO design metrics can help identify fault-prone classes early in the development lifecycle.

logistic regressionpredictionoo metrics
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning

1) The document discusses using machine learning techniques for intrusion detection in healthcare networks. It aims to build an effective intrusion detection system that can efficiently detect intrusions and provide safety for sensitive patient health information and medical data. 2) The methodology involves pre-processing the NSL-KDD dataset, training a decision tree classifier model, and using the trained model to predict intrusions. Accuracy of 90.3% was achieved using cross-validation. 3) Future work could include using all dataset features, immediately alerting administrators of attacks, and making the system multi-lingual. The system aims to provide secure access of healthcare data for authorized users and detect unauthorized access attempts.

irjet
Train-Test Split
Splitting the Data into Training and Testing Sets In this step, we partitioned the dataset into two components: X and y.
Variable X: This includes all the independent variables or features that contribute to our predictions. It encapsulates the
input data for the model.
Variable y: This represents the dependent variable or target variable, which is the outcome we aim to predict. It
encapsulates the output data for the model.
Splitting the data into X and y
To evaluate the performance of our model, we split the dataset into training data and testing data.
Split Ratio: We used an 80:20 split, meaning 80% of our data is used as training data and 20% is used as testing
data. This means the test size was set to 0.2.
Random State: We used a random state of 42 to ensure the reproducibility of our results across different runs. This
means that every time we run the code, we get the same split, ensuring consistency in our evaluations.
Stratify: We used stratify=y to ensure that our target variable (y) is distributed proportionally in both the training
and testing sets.
Standard Scaler
Scaling Numerical Features:
To ensure consistent scales for numerical features, we employed Standard Scaler during
preprocessing.
This helped in normalizing the features, ensuring they contribute equally to the model's
predictions.
Applying Machine Learning Algorithms
This is a Binary Classification problem, the models used are:
Logistic Regression
When faced with binary classification problems, logistic regression can be used to model the probability of a binary
response depending on any number of explanatory variables. - For this dataset, it forecasts whether an occurrence is
statistically a homicidal based on certain features.
Decision Tree
Classification and regression tasks can be accomplished using decision trees which learn simple decision rule from data
features. - For this dataset, it lets one identify different rules and patterns that exist between outcomes in shooting
cases.
Random Forest
Random Forest is an ensemble method that combines multiple decision trees for better classification accuracy and to
avoid over fitting. - For this dataset, its results are more accurate compared to single decision tree alternatives as it
ensembles results from multiple random trees.
Support Vector Machine (SVM)
For classification purposes, SVM computes the best hyperplane that can separate classes within feature space. - For this
dataset, the goal is to have maximum difference from each other among various types of incidents.
Naive Bayes
Naive Bayes is a classification algorithm based on Bayes’ theorem with assumption of independence between predictors. -
This dataset contains a basic yet powerful classifier with probabilistic approach for determining class label
Gradient Boosting:
Gradient Boosting is an ensemble technique that builds models sequentially to correct the errors of the previous models,
enhancing accuracy. For this dataset, it incrementally improves the classification performance by focusing on difficult-to-
classify incidents
Evaluation Metrics
Before Removal of Outliers
Model Accuracy Precision Recall F1 Score
Logistic Regression 0.814469 0.000000 0.000000 0.000000
Decision Tree 0.710623 0.170732 0.145114 0.156884
Random Forest 0.798535 0.219355 0.033564 0.058219
SVM 0.814469 0.000000 0.000000 0.000000
KNN 0.775275 0.209239 0.076012 0.111513
Gradient Boosting 0.813919 0.200000 0.000987 0.001965
Naive Bayes 0.813370 0.000000 0.000000 0.000000

Recommended for you

Performance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRPerformance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDR

The recent blast of dataset size, in number of records and in addition of attributes, has set off the improvement of various big data platforms and in addition parallel data analytic algorithms. In the meantime however, it has pushed for the utilization of data dimensionality reduction systems. Mobile Telecom Industry competition has become more and more fierce. In order to improve their services and business in the competitive world, they are ready to analyse the stored data by several data mining technologies to retain customers and maintain their relationship with them. Mobile Call Detail Record (MCDR) comprises diversity and complexity information containing information like Voice Call, Text Message, Video Calls, and other Data Services usages. It is proposed to evaluate and compare the performance of different dimensionality reduction methods such as Chi-Square (Chi2) Method, Principal Component Analysis (PCA), Information Gain Attribute Evaluator, Gain-Ratio Attribute Evaluator (GRAE), Attribute Selected Classifier (ASC) and Quantile Regression (QR) Methods.

chi-squarepcainformation gain attribute evaluator
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago

This white paper describes the analysis and models developed to predict crimes in Chicago city. Further, the models are compared and most effective and simple model is recommended with the conclusion.

#logisticregression
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf

ISSN 2395-650X The "International Journal of Life Sciences Biotechnology and Pharma Sciences journal appears to be a valuable resource for those interested in staying updated on the latest developments and research in these important scientific fields of Life and science journal.

#publicationpapersjournal
Evaluation Metrics
After Removal of Outliers
Model Accuracy Precision Recall F1 Score
Logistic Regression 0.8175 0.0000 0.0000 0.0000
Decision Tree 0.7548 0.2496 0.1711 0.2030
Random Forest 0.7764 0.2956 0.1626 0.2098
Gradient Boosting 0.8177 1.0000 0.0011 0.0021
SVM 0.8175 0.0000 0.0000 0.0000
Naive Bayes 0.8175 0.0000 0.0000 0.0000
KNN 0.7818 0.2559 0.1024 0.1463
Accuracy: The accuracy of most models decreased slightly after removing outliers, except for Gradient
Boosting which increased slightly.
Precision: The precision of most models remained the same or decreased slightly after removing outliers.
Gradient Boosting had a significant increase in precision.
Recall: The recall of most models increased after removing outliers, with Decision Tree and Random
Forest showing the largest improvements.
F1-Score: The F1-score of most models increased after removing outliers, with Decision Tree and Random
Forest showing the largest improvements.
changes in the metrics
Explanation of Model Selection
Why Not Use Accuracy Alone?
Logistic Regression, Support Vector Machine, Naive Bayes:
Accuracy: 0.8175 Precision, Recall, F1 Score: 0.0000
The accuracy is high, but these models fail to predict the positive class at all, leading to zero
precision, recall, and F1 score. This suggests that these models might be predicting all instances
as the negative class, which can still yield high accuracy if the dataset is imbalanced (i.e., the
negative class is much more frequent than the positive class).
Gradient Boosting:
Accuracy: 0.8177
Precision: 1.0000 (likely due to predicting very few positives correctly)
Recall: 0.0011
F1 Score: 0.0021
Gradient Boosting has slightly higher accuracy, but it also has a very low F1 Score, indicating
that its predictions for the positive class are almost negligible.
Importance of the F1 Score
The F1 Score is particularly useful in the context of imbalanced datasets as it balances precision
and recall. A high F1 Score indicates that the model is performing well in predicting both the
positive and negative classes.
Explanation Model Considerations
Random Forest Selection
Random Forest:
Accuracy: 0.7764
Precision: 0.2956
Recall: 0.1626
F1 Score: 0.2098
Random Forest does not have the highest accuracy, but it has the highest F1 Score among the
models, indicating a better balance between precision and recall. This suggests that Random
Forest is more capable of identifying the positive class correctly compared to the other models,
making it more reliable for practical use.
a very low F1 Score, indicating that its predictions for the positive class are almost negligible.
Conclusion
The model selection is based on the F1 Score because it provides a more holistic view of the model's
performance in scenarios where the dataset is imbalanced. Random Forest was chosen as the best
model because it has the highest F1 Score, indicating better performance in predicting the positive
class compared to other models that might be overfitting to the majority class.
Choosing a model based solely on accuracy can be misleading in such scenarios, leading to models
that do not effectively address the problem of interest.

Recommended for you

San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest

This document presents a project to analyze and predict crime in San Francisco using data mining techniques. The objectives are to analyze the spatial and temporal relationships of crime, predict the category of crime in a location based on variables like location and date, and suggest safest paths between places. The authors describe using naive Bayes, decision tree, random forest and support vector machine classifiers on a dataset of over 878,000 crime incidents to classify crimes and identify patterns. Cross-validation is used to evaluate the classifiers on the training data. The results are intended to help the police department understand crime patterns and deploy resources more efficiently.

crime analysiskaggle
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach

This document discusses using machine learning algorithms to predict whether users will click on advertisements based on their characteristics and behavior. It tests several algorithms on a dataset containing information about users, including Logistic Regression, Decision Trees, and Support Vector Machines. The authors preprocess the data by removing identifying location information and expanding timestamp features. They then divide the data into training and test sets to evaluate the algorithms' performance at predicting click behavior. The goal is to identify users likely to click in order to improve targeted advertising.

irjet
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report

Predict the category of crime in a particular location on analyzing the input variables such as latitude, longitude, date, day and location.

Technical Implementation
Model Inference Pipeline:
• The predict function loads the trained machine learning model and scales input data for
prediction.
• Predictions classify whether a shooting incident is a murder based on the provided
coordinates.
• Using Gradio, we created an accessible interface for users to input coordinates and receive
predictions.
• The interface includes inputs for X_COORD_CD, Y_COORD_CD, Latitude, and Longitude, and
outputs a text classification.
• The tool is designed to be shared and utilized easily, promoting wider adoption and usage.
User-Friendly Interface:
Conclusion
Prediction platform :
By integrating Machine Learning with user-friendly tools, we provide valuable insights and
proactive solutions for public safety. This project exemplifies the power of predictive analytics in
addressing complex societal issues and underscores the importance of data-driven strategies in
enhancing operational efficiency and public safety.
By implementing such a solution, we can significantly contribute to making our cities safer
through advanced analytics and innovative technology solutions
Thank You!!

More Related Content

Similar to Classifying Shooting Incident Fatality in New York project presentation

IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET Journal
 
V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1
warishali570
 
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
cscpconf
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
csandit
 
Visual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in ItalyVisual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in Italy
Roberto Falconi
 
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET Journal
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
ijfcstjournal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...
IJECEIAES
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
IRJET Journal
 
A Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality IndicatorsA Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality Indicators
vie_dels
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET Journal
 
Performance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRPerformance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDR
AM Publications
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago
Swati Arora
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
Sarita30844
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
Sameer Darekar
 
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET Journal
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
Rohit Dandona
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET Journal
 
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
yieldWerx Semiconductor
 

Similar to Classifying Shooting Incident Fatality in New York project presentation (20)

IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
 
V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1
 
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
 
Visual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in ItalyVisual Analytics: Traffic Collisions in Italy
Visual Analytics: Traffic Collisions in Italy
 
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...IRJET -  	  A Survey on Machine Learning Intelligence Techniques for Medical ...
IRJET - A Survey on Machine Learning Intelligence Techniques for Medical ...
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
A Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality IndicatorsA Validation of Object-Oriented Design Metrics as Quality Indicators
A Validation of Object-Oriented Design Metrics as Quality Indicators
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
Performance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRPerformance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDR
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning ApproachIRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
IRJET- Ad-Click Prediction using Prediction Algorithm: Machine Learning Approach
 
San Francisco Crime Prediction Report
San Francisco Crime Prediction ReportSan Francisco Crime Prediction Report
San Francisco Crime Prediction Report
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
 
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
Outlier Detection in Data Mining An Essential Component of Semiconductor Manu...
 

More from Boston Institute of Analytics

Predict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
Predict Your Profits: Optimizing Ad Campaigns with Data-Driven InsightsPredict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
Predict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
Boston Institute of Analytics
 
The Future of F1 Predictions: How Data Science Can Captivate Your Audience
The Future of F1 Predictions: How Data Science Can Captivate Your AudienceThe Future of F1 Predictions: How Data Science Can Captivate Your Audience
The Future of F1 Predictions: How Data Science Can Captivate Your Audience
Boston Institute of Analytics
 
Power Consumption Prediction Project Presentation
Power Consumption Prediction Project PresentationPower Consumption Prediction Project Presentation
Power Consumption Prediction Project Presentation
Boston Institute of Analytics
 
Ethical Hacking Techniques for Web Application Security
Ethical Hacking Techniques for Web Application SecurityEthical Hacking Techniques for Web Application Security
Ethical Hacking Techniques for Web Application Security
Boston Institute of Analytics
 
Exploring Kali Linux Tools for Website Scanning via IP Address
Exploring Kali Linux Tools for Website Scanning via IP AddressExploring Kali Linux Tools for Website Scanning via IP Address
Exploring Kali Linux Tools for Website Scanning via IP Address
Boston Institute of Analytics
 
Leveraging AI for Advanced Facial and Biometric Authentication
Leveraging AI for Advanced Facial and Biometric AuthenticationLeveraging AI for Advanced Facial and Biometric Authentication
Leveraging AI for Advanced Facial and Biometric Authentication
Boston Institute of Analytics
 
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
Boston Institute of Analytics
 
Government Cybersecurity Standards: Building a Secure Digital Landscape
Government Cybersecurity Standards: Building a Secure Digital LandscapeGovernment Cybersecurity Standards: Building a Secure Digital Landscape
Government Cybersecurity Standards: Building a Secure Digital Landscape
Boston Institute of Analytics
 
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Government Standards for Cybersecurity: Ensuring a Secure Cyber EnvironmentGovernment Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Boston Institute of Analytics
 
Hotspot Crime Detection Using Machine Learning
Hotspot Crime Detection Using Machine LearningHotspot Crime Detection Using Machine Learning
Hotspot Crime Detection Using Machine Learning
Boston Institute of Analytics
 
Rain or Shine? An Exploration of Modern Rain Forecasting project presentation
Rain or Shine? An Exploration of Modern Rain Forecasting project presentationRain or Shine? An Exploration of Modern Rain Forecasting project presentation
Rain or Shine? An Exploration of Modern Rain Forecasting project presentation
Boston Institute of Analytics
 
Product Cluster Analysis: Unveiling Hidden Customer Preferences
Product Cluster Analysis: Unveiling Hidden Customer PreferencesProduct Cluster Analysis: Unveiling Hidden Customer Preferences
Product Cluster Analysis: Unveiling Hidden Customer Preferences
Boston Institute of Analytics
 
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
Boston Institute of Analytics
 
Fortifying Your Website: Essential Website Security Measures
Fortifying Your Website: Essential Website Security MeasuresFortifying Your Website: Essential Website Security Measures
Fortifying Your Website: Essential Website Security Measures
Boston Institute of Analytics
 
Understanding Session Hijacking: Protecting Your Online Sessions
Understanding Session Hijacking: Protecting Your Online SessionsUnderstanding Session Hijacking: Protecting Your Online Sessions
Understanding Session Hijacking: Protecting Your Online Sessions
Boston Institute of Analytics
 
Solving Labs for Common Web Vulnerabilities: A Hands-On Guide
Solving Labs for Common Web Vulnerabilities: A Hands-On GuideSolving Labs for Common Web Vulnerabilities: A Hands-On Guide
Solving Labs for Common Web Vulnerabilities: A Hands-On Guide
Boston Institute of Analytics
 
Session Hijacking: Understanding and Preventing Online Attacks
Session Hijacking: Understanding and Preventing Online AttacksSession Hijacking: Understanding and Preventing Online Attacks
Session Hijacking: Understanding and Preventing Online Attacks
Boston Institute of Analytics
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Solar production with K means clustering
Solar production with K means clusteringSolar production with K means clustering
Solar production with K means clustering
Boston Institute of Analytics
 
Demystifying Salaries: A Data Science Approach to Predicting Salary Ranges
Demystifying Salaries: A Data Science Approach to Predicting Salary RangesDemystifying Salaries: A Data Science Approach to Predicting Salary Ranges
Demystifying Salaries: A Data Science Approach to Predicting Salary Ranges
Boston Institute of Analytics
 

More from Boston Institute of Analytics (20)

Predict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
Predict Your Profits: Optimizing Ad Campaigns with Data-Driven InsightsPredict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
Predict Your Profits: Optimizing Ad Campaigns with Data-Driven Insights
 
The Future of F1 Predictions: How Data Science Can Captivate Your Audience
The Future of F1 Predictions: How Data Science Can Captivate Your AudienceThe Future of F1 Predictions: How Data Science Can Captivate Your Audience
The Future of F1 Predictions: How Data Science Can Captivate Your Audience
 
Power Consumption Prediction Project Presentation
Power Consumption Prediction Project PresentationPower Consumption Prediction Project Presentation
Power Consumption Prediction Project Presentation
 
Ethical Hacking Techniques for Web Application Security
Ethical Hacking Techniques for Web Application SecurityEthical Hacking Techniques for Web Application Security
Ethical Hacking Techniques for Web Application Security
 
Exploring Kali Linux Tools for Website Scanning via IP Address
Exploring Kali Linux Tools for Website Scanning via IP AddressExploring Kali Linux Tools for Website Scanning via IP Address
Exploring Kali Linux Tools for Website Scanning via IP Address
 
Leveraging AI for Advanced Facial and Biometric Authentication
Leveraging AI for Advanced Facial and Biometric AuthenticationLeveraging AI for Advanced Facial and Biometric Authentication
Leveraging AI for Advanced Facial and Biometric Authentication
 
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensiv...
 
Government Cybersecurity Standards: Building a Secure Digital Landscape
Government Cybersecurity Standards: Building a Secure Digital LandscapeGovernment Cybersecurity Standards: Building a Secure Digital Landscape
Government Cybersecurity Standards: Building a Secure Digital Landscape
 
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Government Standards for Cybersecurity: Ensuring a Secure Cyber EnvironmentGovernment Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
 
Hotspot Crime Detection Using Machine Learning
Hotspot Crime Detection Using Machine LearningHotspot Crime Detection Using Machine Learning
Hotspot Crime Detection Using Machine Learning
 
Rain or Shine? An Exploration of Modern Rain Forecasting project presentation
Rain or Shine? An Exploration of Modern Rain Forecasting project presentationRain or Shine? An Exploration of Modern Rain Forecasting project presentation
Rain or Shine? An Exploration of Modern Rain Forecasting project presentation
 
Product Cluster Analysis: Unveiling Hidden Customer Preferences
Product Cluster Analysis: Unveiling Hidden Customer PreferencesProduct Cluster Analysis: Unveiling Hidden Customer Preferences
Product Cluster Analysis: Unveiling Hidden Customer Preferences
 
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
Website Vulnerability Assessment: Insights from a Boston Institute Project Pr...
 
Fortifying Your Website: Essential Website Security Measures
Fortifying Your Website: Essential Website Security MeasuresFortifying Your Website: Essential Website Security Measures
Fortifying Your Website: Essential Website Security Measures
 
Understanding Session Hijacking: Protecting Your Online Sessions
Understanding Session Hijacking: Protecting Your Online SessionsUnderstanding Session Hijacking: Protecting Your Online Sessions
Understanding Session Hijacking: Protecting Your Online Sessions
 
Solving Labs for Common Web Vulnerabilities: A Hands-On Guide
Solving Labs for Common Web Vulnerabilities: A Hands-On GuideSolving Labs for Common Web Vulnerabilities: A Hands-On Guide
Solving Labs for Common Web Vulnerabilities: A Hands-On Guide
 
Session Hijacking: Understanding and Preventing Online Attacks
Session Hijacking: Understanding and Preventing Online AttacksSession Hijacking: Understanding and Preventing Online Attacks
Session Hijacking: Understanding and Preventing Online Attacks
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Solar production with K means clustering
Solar production with K means clusteringSolar production with K means clustering
Solar production with K means clustering
 
Demystifying Salaries: A Data Science Approach to Predicting Salary Ranges
Demystifying Salaries: A Data Science Approach to Predicting Salary RangesDemystifying Salaries: A Data Science Approach to Predicting Salary Ranges
Demystifying Salaries: A Data Science Approach to Predicting Salary Ranges
 

Recently uploaded

AIRLINE_SATISFACTION_Data Science Solution on Azure
AIRLINE_SATISFACTION_Data Science Solution on AzureAIRLINE_SATISFACTION_Data Science Solution on Azure
AIRLINE_SATISFACTION_Data Science Solution on Azure
SanelaNikodinoska1
 
EGU2020-10385_presentation LSTM algorithm
EGU2020-10385_presentation LSTM algorithmEGU2020-10385_presentation LSTM algorithm
EGU2020-10385_presentation LSTM algorithm
fatimaezzahraboumaiz2
 
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeSaket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
shruti singh$A17
 
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptxBIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
RajdeepPaul47
 
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model SafeDelhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
dipti singh$A17
 
Introduction to the Red Hat Portfolio.pdf
Introduction to the Red Hat Portfolio.pdfIntroduction to the Red Hat Portfolio.pdf
Introduction to the Red Hat Portfolio.pdf
kihus38
 
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model SafeSouth Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
simmi singh$A17
 
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECTMUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
GaneshGanesh399816
 
[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction
Amazon Web Services Korea
 
Cloud Analytics Use Cases - Telco Products
Cloud Analytics Use Cases - Telco ProductsCloud Analytics Use Cases - Telco Products
Cloud Analytics Use Cases - Telco Products
luqmansyauqi2
 
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
Amazon Web Services Korea
 
Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)
sapna sharmap11
 
Seamlessly Pay Online, Pay In Stores or Send Money
Seamlessly Pay Online, Pay In Stores or Send MoneySeamlessly Pay Online, Pay In Stores or Send Money
Seamlessly Pay Online, Pay In Stores or Send Money
gargtinna79
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
khansayyad1256
 
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
shoeb2926
 
[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers
Amazon Web Services Korea
 
Sunshine Coast University diploma
Sunshine Coast University diplomaSunshine Coast University diploma
Sunshine Coast University diploma
cwavvyy
 
Simon Fraser University degree offer diploma Transcript
Simon Fraser University  degree offer diploma TranscriptSimon Fraser University  degree offer diploma Transcript
Simon Fraser University degree offer diploma Transcript
taqyea
 
Victoria University degree offer diploma Transcript
Victoria University  degree offer diploma TranscriptVictoria University  degree offer diploma Transcript
Victoria University degree offer diploma Transcript
taqyea
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
jiya khan$A17
 

Recently uploaded (20)

AIRLINE_SATISFACTION_Data Science Solution on Azure
AIRLINE_SATISFACTION_Data Science Solution on AzureAIRLINE_SATISFACTION_Data Science Solution on Azure
AIRLINE_SATISFACTION_Data Science Solution on Azure
 
EGU2020-10385_presentation LSTM algorithm
EGU2020-10385_presentation LSTM algorithmEGU2020-10385_presentation LSTM algorithm
EGU2020-10385_presentation LSTM algorithm
 
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeSaket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Saket @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
 
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptxBIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
 
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model SafeDelhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
Delhi @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
 
Introduction to the Red Hat Portfolio.pdf
Introduction to the Red Hat Portfolio.pdfIntroduction to the Red Hat Portfolio.pdf
Introduction to the Red Hat Portfolio.pdf
 
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model SafeSouth Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Glamorous sonam Mehra Top Model Safe
 
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECTMUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
MUMBAI MONTHLY RAINFALL CAPSTONE PROJECT
 
[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction
 
Cloud Analytics Use Cases - Telco Products
Cloud Analytics Use Cases - Telco ProductsCloud Analytics Use Cases - Telco Products
Cloud Analytics Use Cases - Telco Products
 
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
 
Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)
 
Seamlessly Pay Online, Pay In Stores or Send Money
Seamlessly Pay Online, Pay In Stores or Send MoneySeamlessly Pay Online, Pay In Stores or Send Money
Seamlessly Pay Online, Pay In Stores or Send Money
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
 
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
 
[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers
 
Sunshine Coast University diploma
Sunshine Coast University diplomaSunshine Coast University diploma
Sunshine Coast University diploma
 
Simon Fraser University degree offer diploma Transcript
Simon Fraser University  degree offer diploma TranscriptSimon Fraser University  degree offer diploma Transcript
Simon Fraser University degree offer diploma Transcript
 
Victoria University degree offer diploma Transcript
Victoria University  degree offer diploma TranscriptVictoria University  degree offer diploma Transcript
Victoria University degree offer diploma Transcript
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
 

Classifying Shooting Incident Fatality in New York project presentation

  • 2. Classifying Shooting Incident Fatality in New York City leveraging machine learning for predicting shooting incident fatalities. Presented by Indhu Reddy
  • 3. Introduction The public safety sector is evolving rapidly, influenced by technological advancements, changing urban dynamics, and a growing need for data-driven decision-making. Shooting incidents, particularly the fatal ones, pose significant challenges and opportunities for law enforcement agencies. When a shooting incident results in a fatality, it has a profound impact on community safety, public trust, and the strategic allocation of police resources. Machine learning, with its predictive capabilities, offers a transformative approach to understanding and mitigating the challenges posed by shooting incidents. Through data-driven insights and predictive modeling, this presentation aims to showcase my Machine Learning Capstone Project focused on predicting shooting incident fatality in New York City.
  • 4. Why Public Safety Domain? The public safety sector is a unique blend of community well-being, technology, and regulatory frameworks, presenting its own set of distinct challenges and opportunities. I chose the Public Safety Domain for my Capstone Project because: Community Impact: Public safety directly affects the quality of life in communities. Understanding and predicting incidents can help save lives and enhance community trust. Confidentiality: Handling sensitive incident data requires utmost care. Ensuring data privacy and security while analyzing it is a complex but crucial task. Diverse Incidents: Public safety incidents vary widely. Developing models to manage and predict such a diverse range of incidents adds another layer of complexity.
  • 5. Project’s Significance and Benefits to Law Enforcement 1 Enhanced Community Safety: Anticipating fatal incidents allows for proactive strategies, improving response times and community safety. 2 Resource Optimization: Predicting and mitigating fatal incidents is cost-effective, ensuring efficient allocation and utilization of police resources. 3 Risk Mitigation: Identifying potential fatal incidents mitigates risks, enabling preventive measures and strategic interventions. 4 Market Competitiveness: Predictive incident management positions law enforcement agencies as proactive and community-centric, offering a competitive edge through improved public trust and safety. 5 Long-Term Community Trust: By predicting and addressing fatal incidents, my project contributes not only to public safety but also to the broader objectives of law enforcement, fostering community trust and ensuring long-term societal well-being.
  • 6. Dataset Information Column Name Description INCIDENT_KEY Unique identifier for each incident OCCUR_DATE Date of the incident OCCUR_TIME Time of the incident BORO Borough where the incident occurred LOC_OF_OCCUR_DESC Description of the location of occurrence PRECINCT Police precinct where the incident was reported JURISDICTION_CODE Jurisdiction code for the incident LOC_CLASSFCTN_DESC Location classification description LOCATION_DESC Detailed location description STATISTICAL_MURDER_FLAG Indicator if the incident was a murder PERP_AGE_GROUP Age group of the perpetrator PERP_SEX Sex of the perpetrator PERP_RACE Race of the perpetrator VIC_AGE_GROUP Age group of the victim VIC_SEX Sex of the victim VIC_RACE Race of the victim X_COORD_CD X-coordinate of the incident location Y_COORD_CD Y-coordinate of the incident location Latitude Latitude of the incident location Longitude Longitude of the incident location Lon_Lat Combined longitude and latitude Features/Columns: The dataset is characterized by a diverse set of features, each providing valuable insights into shooting incidents, their locations, and outcomes. In total, there are 21 features/columns that form the basis of our predictive modeling. Number of records: Our dataset comprises a robust collection of data, consisting of over 23,000 records. Each record represents a unique shooting incident, contributing to the richness and depth of our analysis. Source of the Data: The dataset is sourced from the New York Police Department (NYPD), provided by the institute, ensuring reliability and relevance. The data's origin plays a crucial role in shaping the context and ensuring that our analysis is grounded in real-world scenarios and industry dynamics. Here are the key details about the dataset used in this project:
  • 7. 1. Initial Data Cleaning First, we made sure there were no null values and duplicates in the dataset  Null Values: Verified that there were no null values in the dataset.  Duplicates: Ensured there were no duplicate records, maintaining the integrity of our data. 2. Feature Evaluation  Column Relevance: We evaluated all columns to determine their usefulness for our analysis.  Dropped Columns: Columns like “INCIDENT_KEY” and “LOC_OF_OCCUR_DESC” weren't contributing much to the predictions, so we decided to drop them during preprocessing. 3. Handling Categorical Variables Categorical to Numerical: The " STATISTICAL_MURDER_FLAG" column was categorical variables. We converted these categorical features into numerical format using label encoding to make them compatible with our model. Preprocessing
  • 8. Exploratory Data Analysis (EDA) EDA Insights: ( Visualizations) Visualizations were essential in providing a clear representation of the data. They offered insights into patterns and helped identify factors contributing to fatal shooting incidents. • Feature Distribution: Analyzed the distribution of features to understand their characteristics. • Correlation Analysis: Highlighted correlations between features using Heatmaps • PCA Scatter Plot: Visualized the data before and after removal of outliers. By performing a thorough EDA, we ensured our dataset was ready for predictive modeling, providing a solid foundation for developing our machine learning model. Columns Worked With: PRECINCT, JURISDICTION_CODE, STATISTICAL_MURDER_FLAG, X_COORD_CD, Y_COORD_CD, Latitude, Longitude
  • 9. Visualizations • Feature Distribution: The histograms display the distribution of key numerical columns in the dataset, specifically 'PRECINCT', 'X_COORD_CD', and 'Y_COORD_CD'. • PRECINCT: This histogram shows the distribution of shooting incidents across different police precincts in New York City. It helps in identifying precincts with higher or lower frequencies of incidents. • X_COORD_CD and Y_COORD_CD: These histograms illustrate the distribution of the geographical coordinates of shooting incidents. They provide insights into the spatial spread and concentration of incidents based on their x and y coordinates.
  • 10. Visualizations Boxplots are essential for visualizing the distribution of numerical features and identifying outliers within the dataset. Outliers can significantly affect the performance of machine learning models, so it is crucial to detect and handle them appropriately. Observations PRECINCT: The precinct column shows a fairly even distribution with no significant outliers. JURISDICTION_CODE: The jurisdiction code column has a few noticeable outliers which could indicate special cases or anomalies in the dataset. X_COORD_CD and Y_COORD_CD: Both X coordinate column show a large number of outliers. This might indicate data entry errors or rare but valid occurrences. where as in Y coordinate there aren’t outliers seen. Latitude and Longitude: The longitude columns also display several outliers, which could be due to incorrect data entries or actual rare geographical points. where as in latitude column there aren’t outliers seen.
  • 11. Visualizations By leveraging correlation analysis through a heatmap, we gain valuable insights into the interrelationships between features, guiding us in building a more robust and accurate predictive model. Observations 1. PRECINCT and Y_COORD_CD/Latitude: There is a strong negative correlation between PRECINCT and Y_COORD_CD/Latitude, indicating that certain precincts are more associated with specific latitude positions. 2. X_COORD_CD and Longitude: These features have a perfect positive correlation, as expected, since they represent the same spatial dimension. 3. Other Features: Most other features show low or moderate correlations with each other, suggesting that they provide unique information to the model.
  • 12. Visualizations PCA (Principal Component Analysis): PCA was used to reduce the dimensionality of the dataset to two principal components (PCA1 and PCA2) for easy visualization. Visualization: The scatter plot visualizes the data points in the new PCA space, highlighting outliers in red and inliers in blue. Observations Before Removal: The left plot shows the dataset with outliers included. blue points represent the outliers detected, while red points represent the inliers. -Outliers can be observed scattered around the inliers, indicating potential anomalies or errors in the data. After Removal: The right plot shows the dataset after removing the outliers. - The cleaned data (in blue) appears more compact and consistent, with fewer scattered points, indicating a more reliable dataset for model training.
  • 13. Train-Test Split Splitting the Data into Training and Testing Sets In this step, we partitioned the dataset into two components: X and y. Variable X: This includes all the independent variables or features that contribute to our predictions. It encapsulates the input data for the model. Variable y: This represents the dependent variable or target variable, which is the outcome we aim to predict. It encapsulates the output data for the model. Splitting the data into X and y To evaluate the performance of our model, we split the dataset into training data and testing data. Split Ratio: We used an 80:20 split, meaning 80% of our data is used as training data and 20% is used as testing data. This means the test size was set to 0.2. Random State: We used a random state of 42 to ensure the reproducibility of our results across different runs. This means that every time we run the code, we get the same split, ensuring consistency in our evaluations. Stratify: We used stratify=y to ensure that our target variable (y) is distributed proportionally in both the training and testing sets.
  • 14. Standard Scaler Scaling Numerical Features: To ensure consistent scales for numerical features, we employed Standard Scaler during preprocessing. This helped in normalizing the features, ensuring they contribute equally to the model's predictions.
  • 15. Applying Machine Learning Algorithms This is a Binary Classification problem, the models used are: Logistic Regression When faced with binary classification problems, logistic regression can be used to model the probability of a binary response depending on any number of explanatory variables. - For this dataset, it forecasts whether an occurrence is statistically a homicidal based on certain features. Decision Tree Classification and regression tasks can be accomplished using decision trees which learn simple decision rule from data features. - For this dataset, it lets one identify different rules and patterns that exist between outcomes in shooting cases. Random Forest Random Forest is an ensemble method that combines multiple decision trees for better classification accuracy and to avoid over fitting. - For this dataset, its results are more accurate compared to single decision tree alternatives as it ensembles results from multiple random trees. Support Vector Machine (SVM) For classification purposes, SVM computes the best hyperplane that can separate classes within feature space. - For this dataset, the goal is to have maximum difference from each other among various types of incidents. Naive Bayes Naive Bayes is a classification algorithm based on Bayes’ theorem with assumption of independence between predictors. - This dataset contains a basic yet powerful classifier with probabilistic approach for determining class label Gradient Boosting: Gradient Boosting is an ensemble technique that builds models sequentially to correct the errors of the previous models, enhancing accuracy. For this dataset, it incrementally improves the classification performance by focusing on difficult-to- classify incidents
  • 16. Evaluation Metrics Before Removal of Outliers Model Accuracy Precision Recall F1 Score Logistic Regression 0.814469 0.000000 0.000000 0.000000 Decision Tree 0.710623 0.170732 0.145114 0.156884 Random Forest 0.798535 0.219355 0.033564 0.058219 SVM 0.814469 0.000000 0.000000 0.000000 KNN 0.775275 0.209239 0.076012 0.111513 Gradient Boosting 0.813919 0.200000 0.000987 0.001965 Naive Bayes 0.813370 0.000000 0.000000 0.000000
  • 17. Evaluation Metrics After Removal of Outliers Model Accuracy Precision Recall F1 Score Logistic Regression 0.8175 0.0000 0.0000 0.0000 Decision Tree 0.7548 0.2496 0.1711 0.2030 Random Forest 0.7764 0.2956 0.1626 0.2098 Gradient Boosting 0.8177 1.0000 0.0011 0.0021 SVM 0.8175 0.0000 0.0000 0.0000 Naive Bayes 0.8175 0.0000 0.0000 0.0000 KNN 0.7818 0.2559 0.1024 0.1463
  • 18. Accuracy: The accuracy of most models decreased slightly after removing outliers, except for Gradient Boosting which increased slightly. Precision: The precision of most models remained the same or decreased slightly after removing outliers. Gradient Boosting had a significant increase in precision. Recall: The recall of most models increased after removing outliers, with Decision Tree and Random Forest showing the largest improvements. F1-Score: The F1-score of most models increased after removing outliers, with Decision Tree and Random Forest showing the largest improvements. changes in the metrics
  • 19. Explanation of Model Selection Why Not Use Accuracy Alone? Logistic Regression, Support Vector Machine, Naive Bayes: Accuracy: 0.8175 Precision, Recall, F1 Score: 0.0000 The accuracy is high, but these models fail to predict the positive class at all, leading to zero precision, recall, and F1 score. This suggests that these models might be predicting all instances as the negative class, which can still yield high accuracy if the dataset is imbalanced (i.e., the negative class is much more frequent than the positive class). Gradient Boosting: Accuracy: 0.8177 Precision: 1.0000 (likely due to predicting very few positives correctly) Recall: 0.0011 F1 Score: 0.0021 Gradient Boosting has slightly higher accuracy, but it also has a very low F1 Score, indicating that its predictions for the positive class are almost negligible. Importance of the F1 Score The F1 Score is particularly useful in the context of imbalanced datasets as it balances precision and recall. A high F1 Score indicates that the model is performing well in predicting both the positive and negative classes.
  • 20. Explanation Model Considerations Random Forest Selection Random Forest: Accuracy: 0.7764 Precision: 0.2956 Recall: 0.1626 F1 Score: 0.2098 Random Forest does not have the highest accuracy, but it has the highest F1 Score among the models, indicating a better balance between precision and recall. This suggests that Random Forest is more capable of identifying the positive class correctly compared to the other models, making it more reliable for practical use. a very low F1 Score, indicating that its predictions for the positive class are almost negligible. Conclusion The model selection is based on the F1 Score because it provides a more holistic view of the model's performance in scenarios where the dataset is imbalanced. Random Forest was chosen as the best model because it has the highest F1 Score, indicating better performance in predicting the positive class compared to other models that might be overfitting to the majority class. Choosing a model based solely on accuracy can be misleading in such scenarios, leading to models that do not effectively address the problem of interest.
  • 21. Technical Implementation Model Inference Pipeline: • The predict function loads the trained machine learning model and scales input data for prediction. • Predictions classify whether a shooting incident is a murder based on the provided coordinates. • Using Gradio, we created an accessible interface for users to input coordinates and receive predictions. • The interface includes inputs for X_COORD_CD, Y_COORD_CD, Latitude, and Longitude, and outputs a text classification. • The tool is designed to be shared and utilized easily, promoting wider adoption and usage. User-Friendly Interface:
  • 22. Conclusion Prediction platform : By integrating Machine Learning with user-friendly tools, we provide valuable insights and proactive solutions for public safety. This project exemplifies the power of predictive analytics in addressing complex societal issues and underscores the importance of data-driven strategies in enhancing operational efficiency and public safety. By implementing such a solution, we can significantly contribute to making our cities safer through advanced analytics and innovative technology solutions