Skip to main content

Advances, Systems and Applications

Violence Detection Approach based on Cloud Data and Neutrosophic Cognitive Maps

A Correction to this article was published on 27 December 2022

This article has been updated


Violence has remained a momentous problem since time immemorial. Various scientific studies are conducted in the recent past to identify the stimuli causing violent behavior among the masses and to achieve the target of cloud data protection. Given the inherent ambiguity or indeterminacy in human behaviour, this study in the area of violence detection appears to be effective, as it finds a variety of stimuli and character qualities that contribute to violent conduct among masses. This uncertainty of traits causing violence can easily be seen in surveillance data present over the cloud and also from the data collected using academic research. Therefore, for the purpose of identifying violent behavior we have considered the factors (data) from existing research and from data over clouds. The factors that lead to violent behavior and are identified by algorithms running over clouds are termed as determinate or certain factors. The factors that were not considered and least identified by the cloud algorithms and given less importance are termed indeterminate factors or uncertain factors. The indeterminate factors are also considered based on the expert’s opinion where the experts are not in a condition to provide a clear stance or when they are neutral in their opinion. Tests are performed using Neutrosophic Cognitive Maps (NCMs) to model the violent behavior taking into consideration both determinate and indeterminate factors. Earlier these tests were performed using Fuzzy Cognitive Maps (FCMs) where indeterminate or uncertain factors were not considered. Therefore, we provide a brief comparison between NCMs and FCMs and show how effective NCMs are when we need to consider the uncertainty of concepts while carrying out tests for identifying violent behavior. Later results are obtained by forming a Neutrosophic adjacency matrix which is evaluated using the concepts of linear algebra. The obtained results in the form of 1 n vector (1 I I I I 1 I 1 I I I I I I I I I I I ) clearly shows the presence of indeterminate factor I in the vector which was absent in earlier models when designed using FCMs. This shows how these indeterminate or uncertain factors play a significant role in cultivating violent behavior which was not shown in the previous study. The study is significant since it takes into account factors from cloud data, experts’ opinions, and also from literature, and shows how these factors are taken into consideration at the data level itself so that they will not impact the modeling stage, and machine learning algorithms will perform well because uncertain and indeterminate information is taken care of at training phase itself. Hence uncertainty could be reduced in machine learning algorithms and in the overall recognition of violent behavior.


It has always been an important issue that crime takes over humanity in history. There is an increase in crime statistics which can be inferred from reports presented by police authorities [1]. A series of studies related to violence in the Latin American context affirms that violence is present in Latin American media [2]. This excess of theming has the effect of building a certain imaginary about violence and producing social attitudes in reference to them. Domestic violence is understood differently in different scenarios within the country and society but most of the time it is associated with violent cases related to women. As a consequence, human rights do not take domestic violence in its category because it does not require the proper response by their governments, organizations, and service providers [3]. The violence that occurs between close partners is inconsistent. Related protocols that define their terms are also inconsistent [4]. Generally, domestic violence deals with the misuse of powers by the life partner and that too a male partner. Most of the time or perhaps always females are not considered as agents of domestic violence [5]. The United Nations gives this statement on the abolishment of violence happening against females, “Any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women, including threats of such acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life.” The nature of ethnocultural has promoted various issues in the world. Violence is at its peak around the world [6]. As per the Global Status report on preventing violence against children [7], the relational savagery that records for most demonstrations of viciousness against youngsters incorporates kid abuse, tormenting, different sorts of youth brutality, and personal accomplice viciousness. The report explored that many countries should implement prevention programs against violence, victim services, and develop National action plans, policies, and laws required to support violence prevention. Crime statistics report of Mexico City shows how many crimes are carried out yearly with respect to the types of crime (Fig. 1).

Fig. 1
figure 1

Crime in Mexico City

The graph shows how crime is expanding yearly. Here crime is mapped into the top level and low level. Top-level crimes like extortion, kidnapping, and low-level crimesare vehicle theft. Violent behavior among people is motivated not only because of determinate factors but also by many indeterminate factors. There is not a single factor that is enough to define why a person behaves in a violent manner and another person does not. Same as one neighbour getting involved in violent activities while another neighbour believes in peace [1]. UN peace operations examined causality data and used it widely for the implementation of primary elements of mandates because the operations they performed, worked as the main actors in the world monitoring. This monitors death related to conflicts, civilian protection, protection of human rights, and avoidance of conflict. These operations may be the best alternative path of data in conflicts where conflicts relatedto deaths per 100,000 population, by age, cause, and sex. These operations explored present casualty data after performing operations in high contexts with three UN missions like The United Nations Organization of Mali, Association Adjustment Commission in the Democratic Republic of the Congo, and The United Nations Mission in South Sudan. These are the areas where organizations and authorities are unable to provide such information. Additionally, monitoring conflict related deaths and casualty recording has turned up as a major tool for performing these operations. This sort of working/monitoring may improve scenario of typical society, and environments. One can get a better understanding of the reasons of the violence that people face and can get a hope of better solution to get rid of [8]. There are many databases that have served as the backbone to control violence [9, 10]. In 2018, there were a slightly higher number of intentional homicides which are given in the following Table 1 [11]:

Table 1 Number of intentional homicides and direct conflict deaths

Violence may be defined as, “A typical phenomenon which has its connections with different factors like economic, social, biological, cultural and political.” Different types of violence have been perceived by world report on violence and health. Data was prepared based on the Ecological model. This was introduced in 1970s for exploration of childhood abuse [12, 13] and used for categorizing different types of violence [14, 15], widely used and still refined as a piece of logical equipment. The main strength is to help in distinguishing between the infinite impacts of violence even at the same moment furnishing a structure for perceiving how do they perform the interaction. Ecological model is given in Figure 2 and that have been categorized in four levels that help in finding the factors which affect human behavior and aids in incrementing the level of committing violence or being a victim.

Fig. 2
figure 2

Ecological model

Before moving on to the analysis of factors, first let us mention all violence types depending on the context in which violence occurs [14, 15]:

  1. i.

    Domestic violence:

Domestic violence includes various categories of violence in which child is exposed in home by familymembers and relatives towards violence. Violence starts to take place when adults are involved in violence and children are there to see unfortunately.

  1. ii.

    School violence:

This type of violence includes most of the types of violence that happens between or among children, peer violence as well as violence growing against children by seniors.

  1. iii.

    Institutional violence:

Institutional violence covers all forms of violence against children housed in residential childcare facilities (peer as well as adult violence against children).

  1. iv.

    Digital violence:

The violence that starts taking place through digital communications or takes place by various means of digital equipment is called digital violence.

  1. xxii.

    Community violence:

Community violence encompasses different forms of straight violence perpetrated on children by strangers, additionally underlying types of violence that manifest themselves as friendly rejection and segregation.

As we’ve seen, detecting acts of violence is crucial in the present context. The emergence of data from different sources is also the most significant and vital feature of daily life in this era of tremendous technological advances. There is also a proliferation of low-cost digital cameras and other devices that stream data of high quality but are otherwise diverse. In order to get useful information from these cameras’ video streams, analysis is required. One of the most pressing requirements for crime prevention is the ability to detect violent behaviour in these data streams. Streaming video and other data are useful for detecting violent content, but the data is not necessarily in an ideal format for analysis. There are a number of imperfections such as indeterminacy and unpredictability, which make it difficult to prioritise the causes of violence. As a result, research into the topic is required to eliminate data-based uncertainty and pinpoint relevant characteristics for analysing violent behaviour. The following section explains why clod data is so crucial in this context.

Cloud Computing

Cloud computing is a model for enabling access to computing resources that evolved in information technology and has become a dominant business model for delivering IT infrastructure, components, and applications [16]. Actually, the term cloud computing first introduced by Eric Schmidt in the conference of Search Engine Strategies in 2006 [17]. There are many definitions of cloud computing, we can say that it is a type of technique where services related to information technology are offered by massive low-cost computing units connected by IP networks. Cloud computing is one of the most popular techniques in current scenario, but security remains a major concern in it [18]. It may use in scenarios where work deals on application basis. Many organizations are involved in promoting cloud computing by its services. John McCarthy explained in his note at MIT in 1961 that the computer utility could become the base of a new and important industry which implied the underlying concepts of cloud computing.

As we know all types of data like, data from different companies, data from government organizations, data from surveillance cameras while recording the events to find out the violence etc. are stored on cloud. Therefore, we are in need to protect this data by finding determinate and indeterminate factors. These factors play an important role in violence detection and prevention. This concept comes in the category of CloudData Protection which is the practice of securing a company’s data in a cloud environment, wherever that data is located, whether it’s at rest or in motion, and whether it’s managed internally by the company or externally by a third party. This work incorporates data from both academia and industry, whether available in literature or over clouds and studies how these factors could be taken into consideration for detecting violence.

The approach adopted in this work holds significance because this not only takes data from the literature, but data from clouds is also considered for detecting violence. This is done keeping in mind the availability of data over clouds. The current approach entails taking data from both the literature and the cloud, whether certain or uncertain, and maps them using neutrosophic cognitive maps in such a way that relationships between data can be drawn in order to derive meaningful insights from the data for violence detection. This approach is oriented towards solving the problem of real time violence detection and machine learning usage in its detection has been encountered at various occasions [19,20,21]. The contribution of present work is that, this work uses neutrosophic sets and theories for violence detection. The limitations of existing methods have motivated this study. Earlier approaches were mainly based upon fuzzy cognitive maps for prioritizing the traits of character which cause violence. These approaches were not efficient since they did not take into consideration the indeterminacy associated with data. Also, fuzzy methods take into consideration all those factors where membership functions can be defined. Therefore, cannot represent situation when factors are indeterminate because fuzzy does not define functions for indeterminate membership. These limitations of fuzzy have motivated us to take the task of using neutrosophy for prioritizing factors that are responsible for causing violence.

The other six sections of the study are organized as follows: Section 2 describes research that was done by researchers using various datasets in the field of violence detection. Additionally, it clarifies the issue and the significance of cloud data in this context while mentioning many literary works that make use of cloud data. The concepts and preliminary information needed to carry out this research are introduced in Section 3. The materials and methodology used in this research are summarised in Section 4. The neutrosophic application for modeling the situation utilizing factors affecting violence is highlighted in Section 5. Section 6 presents the results, while Section 7 presents a thorough analysis.

Related Work

This section illustrates various works from literature that are carried out in order to identify traits of character for violence detection. The works are categorized based on factors which have been used for detecting violence. This literature forms the basis for selection of data for modeling stage. The data which is taken comprises of both i.e., data from literature and data from cloud sources. Now let us understand literature as follows:

In this article, we focused on work done by prominent researchers and different case studies of Ghana [22], Police Service of Northern Ireland Statistics and Research Agency (NISRA) [23], Ethiopia [24], Reports published by World Health Organization (WHO) [25], Fordham University (New York) [26], and Jordan Institute for families [27] to identify the factors resulting in violent behaviorand took cloud data [19] to maintain the confidentiality, integrity and availability of an organization. Violence is motivated by several factors. Some of the factors are highly visible and much cited by the researchers termed as determinate or known or certain factors, while some are less cited but having larger effects on the criminal behavior are named as indeterminate or unknown factors or uncertain factors throughout this research. Mapping these determinate and indeterminate factors can help policymakers, professionals and practitioners to identify criminal behaviors and build a surveillance system that may help in violence detection. Now let us understand each of them one by one.

Ebenezer S. OwusuAdjah et al. [22] found in their study that married women from Ghana reported factors that increase the possibility of creating places for domestic violence. Authors analyzed& gathered risk factors by using procedure of forward selection and multivariate logistic model on information provided by Ghana Demographic and Health Survey (GDHS) in 2008. At last, they found in their data that 1525 ever-hitched lady, and 33.7% had at any point experienced aggressive behavior at home. They observed that theaverage for confronting aggressive behavior at home was 35% for those ladies who live in metropolitan regions and the average of abusive behavior at home was 41% higher for ladies whose spouses at any point encountered their father beating their mother. So, living place, family history related to crime plays a greater role in determining the criminal behaviors among people which is less noticed by the researchers and hence finds a lower position while formulating the policies by the policymakers. Hence it is an indeterminate factor. Generally, it was noticed that ladies whose spouses drink too much alcohol face domestic violence 2.7 times higher than ladies whose spouses do not drink or do not take too much vine, so it is considered as determinate factor.

Michael A. Koenig et al. [28] found in their studies that violence (physical, sexual, and domestic) associated with individual factors of childlessness, economically not strong persons, some sort of pressure, and transmission of violence intergenerationally are important factors to violence. Hence, they termed as certain or determinate factors. Furthermore, the dowry system of India generates a relation with a higher risk of violence and level of dowry is highly determined by the financial condition of the family which in turn results in crime as pointed out by authors, hence it becomes an indeterminate factor leading to violence.

Sylvie Mrug et al. [29] investigated emotional desensitization which leads violence where external issues played role as a mediator of connection between exposure to violence into two categories like preadolescence and violent behavior in late adolescence. As we have seen some adolescents are exposed to violence in house, community, and college. Hence, they are termed as known, determinate, and certain factors. It has been represented in low levels of internalizing symptoms that high level violence has been linked to emotional desensitization. Even long consequences of desensitization are undefined. Hence on a broader note we take long term emotional of desensitization as an indeterminate factor which has a wider impact on criminal behavior.

As per Fordham University, New York [26], there are many factors that lead to aggressive behavior which contribute to violence, no one can stop by saying that this is the only definition of factors regarding aggressive behavior. General or known factors affected with aggressive behavior includes vandalism or fighting, excessive use of drug, alcoholic abuse, plans for violence, easy access to weapons but there are many factors that may be indeterminate that leads violence like extreme requirement for respect, feeling of low self-esteem, early misbehave with children, bullied, standing with violence in house, community, or in media.

Lyn Francis et al. [30] explored how ladies judge their experience of abusive behavior at home and also tried to ignore or end violence. There are many complex barriers that create pressure on women to keep silence on disclosing abuse, action to finish domestic violence. Some women did not acknowledge and even some women did not realize that their relationship was indefinite and sometimes tried to deny or minimize the maltreatment to adapt to the aggressive behavior at home. Authors found in their study that woman does not recognise nor even acknowledge abuse in their relationship, this took long time to provide best service. If they acknowledge violence at time then there will be some services on time which may help in minimising violence. Hence “Denying or minimizing the abuse by women” considers as indeterminate factor that leads violence.

Prothrow-Stith et al. [31] explored why manhandled kids experience issues in learning and studied the effect of experiencing childhood in vicious environmental elements and insecure neighbourhoods. Violent surroundings play an important role to grow with bad effects, that’s why it encourages more violence. So unsafe neighbourhood may lead to an indeterminate factor that leaves an important impact on violence.

Devadoss et al. [32] analyzedthe causes of youth violence. Both deadly and non-deadly assaults involving youth play widely to the weight of early demise, hurt, and infirmity. Basically, youth violence profoundly hurts not exclusively its causalities, yet in addition their families, companions, and networks. Authors worked on factors like Poor family functioning, Membership of a gang, Poverty in the community, Inequality, Influences of mass media but there are some indeterminate factors that should be considered like Dropping out of school, Denial of opportunities, Hiking of prices related to basic requirements of survival, Long drawn strike, Fake encounter, Run away from home, Violent video games, and Treatment by the teacher.

According to the Police Service of Ireland & NISRA (Northern Ireland Statistics and Research Agency) [23], any type of violence committed online or by Internet-based activities should be flagged. Authorities are involved in finding the reason of violence based on determinant factors like email, social media, websites, messaging platforms, etc., but they should go by the indeterminate factor like gaming platform or smart devices. Figure 3 shows the number and types of online crimes for Northern Ireland by the type of offenses.

Fig. 3
figure 3

Number and percentage of online crime by type of offenses, 2020/21

Reva et al. [33] found in their study that targeted to examine and to expand the understanding of the working authorities who contribute to this area, to recommend possible ways to stop the imposed marriages. Constrained relationships are relationships where one of the two life partners does not consent to marriage or does not agree to the marriage. Brutality, dangers, or some other type of pressure is involved to realize the relationships and cause various exploitations. So, we can take forced marriages as an indeterminate factor that has an impact of violence happening.

World Report on Violence and Health [34], found that approximately 565 children, adolescents and young people into the age limit of 10 to 29 years die each day just because of interpersonal violence across the world. Mostly these cases may be seen from region of South-East Asia and rapid growth of violence escalation among youth in each Nation, culture and community is disturbing.

Kaufman et al. [24] found that violence based on gender is a genuine public concern in Ethiopia. As per author’s concern, harassment is known factor for gender-based violence in Ethiopia and there are other serious factors that lead violence as intimidation giving low social status to female students. These should be considered as unknown or indeterminate factors. WHO found in a study about health domestic violence related to women [35] that 71% of Ethiopian women faced physical or sexual brutality by their husband. This type of brutality/violence leaves a bad impact in their country, community and relations.

Pretus et al. [36] found an emotional element in his research that can affect any individual to get involved in violence among different groups for the values that are at stake. Sacred values are related to human emotions, for this people are ready to fight or even ready to die. People are always ready for the defence of these values, and they are very close to the people [37]. It does not matter what is the significance of them. These may be religious or secular like Holy Land, The Nation etc., these examined like critical to draw disputes recalcitrant [38,39,40]. Hence sacred values may be the indeterminate factor.

Jordan Institute for Families [27] released practice notes for predicting the violence and as usual they found known factors that leads violence like humiliation, access to weapons, experiencing childhood abuse or aggression in the home and found some indeterminate factors like boredom and a sense of powerlessness, feeling a sense of injustice or oppression.

Virginia Saez et al. [41] presented a state-of-the-art of research that addressed the mediatization of the phenomenon of violence in schools, from the mid-1970s to 2015. Their study showed the advances in research, predominantly Latin American, on the ways in which the media present the phenomenon of violence, its relationship with young people and the school. Authors categorised their work in three states: the contents and forms of violence in the discourses of the media information; informative coverage on young people and their connection with violence; and the school as a privileged setting for the mediatization of violence. Theoretical and methodological aspects involved in the research are examined. Subsequently, a review is made of the dimensions, violent episodes that still remain to be explored so it can be counted as indeterminate factor.

World Health Organization (WHO) [25] prepared data in terms of report on health and violence, found cause for death. As per the report, these death rates vary based on the Gross National Income (GNI). Death rates in low- and middle-income countries are more than twice as high (32.1 per 100,000) as those in high-income countries (14.1 per 100, 000). This can be seen in given figure that there is a huge amount of differences in death rates among WHO regions. WHO found in report that rates of Homicides are three times higher than rates of suicide in the regions of Africa and America as shown in Fig. 4. An average rate of suicide is higher than double rate of homicide in the regions of South-East-Asia and Europe. By these findings, we can take the income level of countries as an indeterminate factor.

Fig. 4
figure 4

Homicide and Suicide rates by WHO regions

Labrum Travis et al. [42] reviewed reasons of violence at home towards family members. Authors found about persons who have mental illness, involved in violence, generally they make trouble for caretakers, but not intentionally. As per author, family members faced violence, who have direct contact with mental illness person. Last year victimization was 20% higher. People living with dysfunctional behavior are at a humbly expanded chance of carrying out viciousness, lopsidedly prone for focus relatives which people really do commit ruthlessly. Authors found known factors behind the violence like recent victimization, mental health treatment, hostility, criticism in their work but there are indeterminate factors that authors talked about like nonadherence to medications and verbal aggression.

According to Rutgers [43] there are several contributing indeterminate factors in violence like penchant for narcissism to treating the casualty with no respect or regard, utilization of a fierce way of behaving, and ability to control the person in question and following. As per the study of Centres For Disease Control and Prevention under the chapter of violence prevention [44], violence related to youth made an understanding of factors that make public more vulnerable to victimization. Aggression in behavior, drug involvement, tobacco, alcohol, poor behavior with community, emotional distress, uncounted beliefs, bad attitudes are the risk factors that lead to youth violence but many violence factors that are too far from agencies they are just like unknown but have a significant role in violence, poor monitoring & supervision of children, parental substance abuse or criminality, and socially disorganized neighbourhoods. Violence is taking over humanity. To overcome violence, many prominent researchers did lots of work [45,46,47].

Chihlin et al. [48] performed work to overcome domestic violence by taking education as an indeterminate factor with the help of services of cloud computing. Authors considered gender paradigm and much involvement in technology as the factors leading to violence and presented novel method so that public can do legal work for their safety, education on family values, and family therapy supported by professional community members via cloud computing platform. Since cloud computing service can make education accessible to the needy people based on their demand.

Omar Sabri et al. [49] presented pros and cons of each factor and presented plan for picking best answer while selecting cloud computing service to overcome violence with cloud-based data. Authorsused two famous models of Information Systems Success, McLean and DeLone [50] model for accessing few elements that should consider by an organization when making the decision of adopting cloud computing services.

Diana Freed et al. [51] presented the role of mobile devices, and services of cloud computing playan important role in intimate partner violence (IPV). Theseinclude domestic abuse (determinate factor), stalking, and surveillance of victims by abusive partners. Authors conducted interviews with 40 IPV professionals and nine focus groups with 32 survivors of IPV and revealed a complex set of socio-technical challenges that stem from the intimate nature of the relationships involved and the complexities of managing shared social circles in IPV ecosystem, New York City. Both IPV professionals and survivors felt that they did not possess adequate expertise to be able to identify or cope with technology enabled IPV, and there are currently insufficient best practices to help them deal with abuse via technology. Many prominent researchers did the work regarding security challenges in cloud [52] and influencing factors in the decision to adopt cloud computing in the private sector [53]. Edeh et al. [54] worked on cloud security challenges by considering sacred nature of educational data, authors examined the implications of cloud security challenges on education and found that security [55] is very significant to the successful migration and implementation of cloud technology in the educational sector. It also shows that the growing security limitations associated with cloud computing technology has the tendency to discourage many educational institutions from adopting cloud services.

According to recent research by Palanivinayagam A. et al. [56], conventional crime detection and machine learning-based algorithms are unable to properly forecast crime trends because they are unable to produce essential prime qualities from the crime dataset. Their strategy is geared toward improving the topic machine learning algorithm’s precision by extracting the most salient attributes, such as time zones, crime probability, and crime hotspots, and doing vulnerability analysis. Concerns about security and privacy in relation to unmanned aerial vehicles were briefly analysed by Siddiqi M.A. et al. [57]. As a means of addressing these issues, the report also provided solutions and recommendations. In addition to providing a high-level overview of UAVs/drones, this paper updated the reader on the latest in relevant rules, classification, architecture, and communication protocols. The document also covered use cases, security flaws, countermeasures against various threats, and constraints. The report closed with a discussion of future research directions and some suggestions for bolstering the safety and privacy of UAVs.

Chen Zhi et al. [58] presented violence detection by Unmanned Aerial Vehicle (UAV) on the platform of cloud and used cameras to monitor public places, shoot videos and send them to the cloud platform to detect the violence in the videos, which can discover the violence in public places in time and give early warning to prevent criminal incidents. On the basis of the aforementioned works, many determinate and indeterminate factors that contribute to the environment of violence are identified. These works demonstrate not only how these factors contribute to violence, but also demonstrate how they might be included into future efforts to detect violence in real-time streaming media. Consequently, this research integrates these factors, as well as factors extracted from cloud data based on related works, in order to discover the most influential personality traits that lead to violent behavior. The motivation behind this work is need to address the issue of data imprecision when developing methods for violence identification in videos. This imprecision results from classifiers’ reliance on erroneous and incomplete data, which produces an inaccurate decision function. This also occurs when scores generated by many classifiers are fused; this is known as the imperfection problem. This research is also motivated by the belief that algorithms for detecting violence would perform better if they explicitly account for the indeterminacy, uncertainty, and imperfection of data at both the representational and decision levels. In fact, machine learning techniques are inseparable from indeterminacy and uncertainty as data that is used during the training phase is most of the time imprecise, incomplete, indeterminate, and noisy. The problem is also faced in classifier learning because the primary objective of classifier learning is prediction accuracy. Handling indeterminate and uncertain data should be a major concern of classifier learning since indeterminate data may impact not only interpretations of data and designed models but also impacts the sole purpose of the classifier, that is, prediction accuracy. Moreover, the generalization beyond that data, the process of induction, is still affected with uncertainty. This research, which focuses on the study and development of neutrosophic techniques for better handling of uncertain and indeterminate data in designing algorithms, is driven by the growing need for the development of effective and sophisticated techniques for handling data imperfections while designing approaches for violence detection.

Concepts and Preliminaries

Fuzzy logic and Fuzzy Cognitive Maps [59] are used to model the situation of violence. There exists a lot of work that has used these concepts some of them have multiple limitations [60, 61]. Basically,Fuzzy logic depends on membership function and crisp sets that are used for showing the relationship among the concepts. Fuzzy logic is used to map the existenceand nonexistence of membership among different concepts, but it does not say anything about the uncertain or indeterminate concepts. It is observed that whenever violent behavior is identified using machine learning we need to address a lot of factors which are indeterminate since most of the time we need to deal with unsupervised data. Since fuzzy sets and theories deals with only certainty of factors, here we employ neutrosophic sets and systems to deal with uncertainty among data representing various factors. There exist research areas where we can deal efficiently with uncertain concepts using Neutrosophy [62, 63]. Neutrosophy is a field that deals not only with determinacy but also deals with indeterminacy. This is an emerging field that plays an important role while dealing with any situation. We can see a number of applications of neutrosophy where it has been used as a tool to resolve number of issues around the world and satisfied with efficient results as we can see in [64, 65], here authors proposed decision making model on multi-criteria for examine sustainable hydrogen production and proposed a system related to decision making and focusing on multi criteria for medical system respectively. Abdel et al. [66] presented Type-2 Neutrosophic Number to explain information related to real cognition by taking multiple case studies. Many authors did the great work by using the concept of Neutrosophy & Fuzzy Cognitive Maps [67], [68], [69]. This motivates us to analyze the violence situation of various case studies and report provided by genuine organizations and authorities. We must understand the methods we are going to apply. These all are as follows:

Neutrosophic Logic

Let us consider a neutrosophic set N = {(T, I, F) : T, I, F (0, 1)} N. A mapping m : P → N of various propositional formulas into N, i.e., for every pP is associated to a value in N, a value in N exists as given in Eq. (1), notifying p is T% true, I% indeterminate and F% false.


So, in conclusion, when fuzzy logic is generalized based on some concepts of neutrosophy; it becomes neutrosophic logic according to [62].

Neutrosophic Sets

Let U be a universe of discourse, and M a set included in U. An element x from U is noted with respect to the set M as x(T, I, F) and belongs to M in the following way: it is t% true in the set, i% indeterminate (unknown if it is) in the set, and f%false, where tvaries in T, i varies in I, fvaries in F. Statistically, T, I, and F are subsets, but dynamically T, I, and F are functions/operators depending on many known or unknown parameters. Neutrosophic set is a generalization of intuitionistic fuzzy set, inconsistent intuitionistic fuzzy set (Picture fuzzy set, Ternary fuzzy set), pythagorean fuzzy set (Atanassov’s intuitionistic fuzzy set of the second type), q-Rung orthopair fuzzy set, spherical fuzzy set, and n-hyper spherical fuzzy set.

Neutrosophic Triplets

Consider a concept, an idea, a statement, or any other sentence represented by <A>; there always occurs the opposite of that concept, idea, statement, or sentence represented by <anti A>. In between the concepts and opposite of concepts, i.e., between <A > and < anti A>, there always occurs a neutral part which is referred to as <neut A>. This neutral concept refers to indeterminacy. This indeterminacy i.e. <neut A > is neither <A > or < anti A > but it may be partial <A > or < anti A>. The set which consists of these three concepts i.e. <A>, <neut A > and < anti A > is a neutrosophic triplet i.e. (<A>, <neut A>, <anti A>) is a neutrosophic triplet.

Neutrosophic Matrix

Generally, a matrix contains number of rows (m) and columns (n). In Neutrosophic Matrix [aij]nm, whose entries are of the form a + lb (neutrosophic number), where a, b are elements of the interval [0, 1] and I is an indeterminate such that I^n = I, n being a positive integer. So, the difference between the neutrosophic number of the form a + lb and the single-valued neutrosophic numbers is that the generalization of fuzzy numbers and the single-valued neutrosophic components <T, I, F> is the generalization of fuzzy numbers and intuitionistic fuzzy numbers. Since the fuzzy number lies between 0 to 1 so the component neutrosophic fuzzy number a and b lies in [0, 1]. In the case of single-valued neutrosophic matrix components will be the true value, indeterminacy, and fails value with three components in each element of a matrix [70, 71].

$$M=\left[{a}_{ij}\right] ij$$
$$i=1,2,3,4,\dots \dots \dots \dots \dots, m$$
$$i=1,2,3,4,\dots \dots \dots \dots \dots, n$$

and every aij (I) where K(I) is neutrosophic ring. Let’s explain Neutrosophic Matrix with an example. Assuming that each and every matrix element is presented by a + lb, here a, b denotes real numbers, and I denote indeterminacy.

$$\left[\begin{array}{ccc}-3& 7I& I\\ {}5& 8& 6\end{array}\right]\left[\begin{array}{ccc}4& 7I& 9\\ {}3& I& 5\\ {}2& -4& 0\end{array}\right]=\left[\begin{array}{ccc}11I& -18I& 8I\\ {}56& 19I& 85\end{array}\right]$$

Neutrosophic Graph

Neutrosophic graph contains nodes that represents concepts and links among various nodes show which shows the relationship between nodes as in general graph. Some of the nodes of Neutrosophic graph known as Indeterminate node and links are known as Indeterminate edges. After considering reference from the Neutrosophic Matrix, we can say that if [aij] = 0, then there is no relation/connection between nodes i and j, if [aij] = 1, then we can say that there is a relation/connection between nodes i and j, and if [aij] = 1, then we can say that relation/connection is indeterminate (unknown). Let us take a Neutrosophic directed graph [72] that have 5 vertices and have edges that are known as neutrosophic edges shown by Fig. 5.

Fig. 5
figure 5

Neutrosophic Graph

Here, dotted lines represents neutrosophic edges and neutrosophic matrix M related to above graph is given below which is a 5  5 (matrix)

$$M=\left\lceil \begin{array}{ccccc}0& 3& 0& 2I& 0\\ {}0& 0& 0& 0& 0\\ {}1& 0& 0& 0& 4I\\ {}0& 7& 2& 0& 5\\ {}0& 7& 0& 0& 0\end{array}\right\rceil$$

Cognitive Maps

These are network known as cause-effect networks, where nodes represents concepts articulated by individuals, and directional linkages capturing causal dependencies [73]. To address causal thinking, Fuzzy cognitive maps (FCMs) are used which is also known as structure graph for Fuzzy concepts. Their fuzziness allows hazy degrees of causality between hazy causal objects (concepts). Their graph structure allows systematic causal propagation, in particular forward and backward chaining, and it allows knowledge bases to be grown by connecting different FCMs. FCMs are especially applicable to soft knowledge domains. Causality is represented as a fuzzy relation on causal concepts [59].

Neutrosophic Directed Graph

A simple graph contains nodes and edges. A graph is said to be directed when edges of this graph have direction towards nodes. Here nodes work as a concepts and edges showingrelations among nodes. Neutrosophic Cognitive Maps, which are neutrosophic directed graphs that can transpose concepts like factors, processes, events, economic policies, as nodes, and indeterminacy as edges [74]. Directed graph is associated with values for each relation, we can see a representation of the relationship between concepts. After construction of the directed neutrosophic graph, the matrix associated with it is written, resulting thereby in the adjacency matrix of the neutrosophic cognitive map [75].

Materials and Methodology

To understand the methodology adopted in current research we need to first understand the concept of FCM [74]. A fuzzy cognitive map (FCM) is a type of knowledge graph made up of nodes that represent various concepts and connections between these nodes is represented by edges [59]. Its popularity is clearly influenced by the introduction of Google’s knowledge graph in 2012 [76]. Significantly, big corporations such as Google, Yahoo, Microsoft, and Facebook have developed their own knowledge graphs that enable smarter data processing and delivery: The application of these knowledge graphs is now the rule rather than the exception [77]. The concepts in FCM represent a causal system and they are mostly non-linear. The relationship among these nodes can take values in the range [0, 1]. The directed links that define concepts & associations can be positive or negative, with values ranging from − 1 to 1 [78]. Though efficient these FCMs do not take into consideration the indeterminate relationship among concepts. Indeterminacy should not only be understood as it is mentioned in the lexical dictionary but it should be understood as something that exists between <(concept) > and < anti (concept)>, i.e., in between the opposites. This indeterminacy of concepts and relationships among them can be termed as uncertain, unclear, vague, conflicting, neutral, incomplete, unknown, etc. [79]. We would like to use the concept of NCMs to model the situation of determinate and indeterminate factors that affects violence. As we know NCMs are Neutrosophic Graphs and known as directed graphs. This graph contains two types of edges, first type of edge is complete edge as we have seen in normal graph, this edge shows determinacy, and another type of edge is dotted edge which represents indeterminacy. Nodes of the graph are referred as various concepts. For example, N1, N2, N3, …. . Nn represented as nodes of Neutrosophic Graph. These nodes referred as concepts that are connected with the help of edges having weights like “0” or “1” or “I”, where ‘0’ represents that particular node is in “OFF” state, “1”represents that particular node is in “ON” state, “I” represents indeterminacy. Generally, these types of Neutrosophic Cognitive Maps are called simple NCMs. Corresponding matrix to Neutrosophic Graph is known as Neutrosophic Adjacency Matrix [80, 81]. After that, this matrix will be evaluated by mathematical laws to get the required result. The result we obtained will beinterpreted for presenting the significance of the work. Let’s take an example of South Africa and affecting factors for violence. Authors tried to prove the effectiveness of NCMs over FCMs for analysing current scenario of violence in the world by Fig. 6.

Fig. 6
figure 6

Fuzzy Cognitive Map based on determinate factors

In this example [82] authors took ten Known or Determinate Factors like K1, K2, K3, ………K10 and tooknine Indeterminate Factors like U1, U2, U3, ………U10. Authors took Blue Color for showing Determinate Factors and Orange Color for showing Indeterminate Factors respectively. It does not matterwhatever the color we chose for the nodes. Straight simple line shows the relationship among Determinate Factors affecting violence and dotted lines show the relationship among Indeterminate Factors. The edges have weight “1” that represents known or determinate factors and the edges having representation "I" shows Indeterminate edges. Actually, Fuzzy Cognitive Map does not take into consideration unknown or indeterminate factors, so we put outside these factors U1, U2, U3, ………U9. Here we put factors U1, U7, U8, U9 separately because they do not have relation and does not affect each other and U2, U3, U4 in relation with each other same for U5, U6because they have relations and affecting each other. Indeterminate factors exist in real life or in real world and Neutrosophic Cognitive Map takes all these factors into consideration.

Above mapping of node to node and centre to node is formed for mapping the factors related to violence. Those edges having weight "1" are called determinate edges and show how known factors are used to nourish the violence. We can see here that indeterminate or unknown factors are not connected to determinate nodes which represents violence because Fuzzy Logic does not focus on indeterminate relations. Authors mapped indeterminate concepts that are related to one another with dotted line denoted by "I". After doing all these things, authors formulated adjacency matrix represented by Table 2 for the above graph.

Table 2 Adjacency Matrix based on NCM (Fig. 6)

Now, Fuzzy Adjacency Matrix will evaluate here to find the factors that affect violence. Let’s take SA as vector that have in ‘ON’ state. Vector was taken as input to understand the effect of SA1 = (1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0) on combined system SA1 N(E). Authors used symbol → to denote the resultant vector is updated and threshold. Further authors performed calculations until they obtained a constant vector, this is known as limit cycle.

$$\boldsymbol{Step}\ \textbf{1}. SA1\ast N(E)=\left(0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\right)\to \left(1\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\right)=\textrm{SA}2$$
$$\boldsymbol{Step}\ \textbf{2}. SA2\ast N(E)=\left(9\ 4\ 0\ 3\ 0\ 2\ 0\ 2\ 0\ 1\ 0\ 1\ 0\ 3\ 0\ 3\ 0\ 2\ 0\ 2\right)\to \left(1\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\right)=\textrm{SA}3$$

We noticed here that SA2 = SA3, therefore, there is no need to perform further calculations. After performing calculations, authors found limit cycle SA shows hidden patterns that help to draw inferences, this is the significance of limit cycle. Here, obtained results shows, when crime is in ´ON´ state in South Africa then factors like poverty, limitations in cognitive and social abilities, rejection by schools, violence related to family, confliction in culture, colonialism, job unavailability, unbalanced salary, violent expression attitude and try to solve problems with violence. This states that these mentioned factors are directly affecting crime in South Africa. There are several factors that are notified by researchers like multiracial character of the community, adherence to social norms, political transition, apartheid policy, and justice system for criminals, gathering of people, use of crystal meth/ methamphetamine, violence between partners, and femicide are unavailable in current sense. Therefore, it has been cleared that Fuzzy Cognitive Maps take no value related to indeterminate factors which could have direct influence on the concepts. So, we must work with situations using Neutrosophy [63], [83, 84].

Neutrosophic application for Modeling the situation using Factors affecting Violence

We found many factors from the literature that will help to design the condition of violence. The following Table 3 shows factors that are considered as determinate and Table 4 shows factors that are considered as indeterminate.

Table 3 Determinate or Known Factors
Table 4 Indeterminate or Unknown Factors


After taking all these factors & their relationship to violence, we must model the condition of violence based on the concept of Neutrosophic Cognitive Maps. This is the graph for mapping the condition of factors related with violence7. Nodes denote factors and edges denote relationship from node to node or from node to factors. Some nodes have representation like D1, D2, D3, ………, D26 known as Determinate Factors, and another node have representation like I1, I2, I3, ………I30 known as Indeterminate Factors. The edges have weight "1" represents known or determinate edges and the edges having representation "I" represents Indeterminate edges. Graph contains two types of edges, first type of edge is complete edge as we have seen in normal graph, this edge shows determinacy and another type of edge is dotted edge which represents indeterminacy. We took Blue color for showing Determinate Factors and Orange color for showing Indeterminate Factors respectively as we have in Fig. 7. Straight simple line shows the relationship among Determinate Factors and dotted lines show the relationship among Indeterminate Factors. The edges have weight "I" representing known or determinate edges and the edges having representation "I" represents Indeterminate edges. We have formulated adjacency matrix given in Table 5 for the above graph.

Fig. 7
figure 7

Neutrosophic Cognitive Map for factors affecting violence

Table 5 Adjacency Matrix based on NCM 7

Now, this Neutrosophy Adjacency Matrix will be evaluated to show the significance of factors causing violence. We will take vector FA as “ON” state i.e. the state vector is given as input:

$$FA=\left(1\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\right)\ \textrm{and}\ \textrm{the}\ \textrm{combined}\ \textrm{system}\ \textrm{is}\ FA1\ast N(E).$$

The symbol → denotes that the resultant vector is updated and threshold. Based on the methodology mentioned above following iterations are carried out. These iterations are performed till we obtained a limit cycle. This limit cycle is also referred as constant state vector.

$$\boldsymbol{Step}\ \textbf{1}. FA1\ast N(E)=\left(0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\right)\to \left(1\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\ 1\ 0\right)=\textrm{FA}2$$
$$\boldsymbol{Step}\ \textbf{2}. FA2\ast N(E)=\left(9\ 2\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 2\ 2\ast \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\right)\to \left(1\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\right)=\textrm{FA}3$$
$$\boldsymbol{Step}\ \textbf{3}. FA3\ast N(E)=\left(9\ 5\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\right)\to \left(1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\right)=\textrm{FA}4$$
$$\boldsymbol{Step}\ \textbf{4}. FA4\ast N(E)=\left(9\ast \textrm{I}\ 5\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\right)\to \left(1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\right)=\textrm{FA}5$$
$$\boldsymbol{Step}\ \textbf{5}. FA5\ast N(E)=\left(9\ast \textrm{I}\ 5\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 3\ast \textrm{I}\ 2\ast \textrm{I}\ 2\ast \textrm{I}\ \textrm{I}\right)\to \left(1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ 1\ \textrm{I}\ 1\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\ \textrm{I}\right)=\textrm{FA}6$$

We noticed that FA5 = FA6, hence, there is no need to perform further calculations because we got FA6 as a limit cycle or fixed point. The Limit cycle shows hidden patterns that are used in mapping inferences. These inferences are used to show the joint effect of interacting knowledge. To get the current result we used Neutrosophic Cognitive Map that is (1 I I I I 1 I 1 I I I I I I I I I I I ) which shows that when crime is in ON state all the factors such as Excessive use of alcohol, Childlessness, Economic pressure, Inter-generational transmission of violence, Emotional desensitization, Physical fighting, excessive use of drug, alcoholic abuse, plans for committing violence, Email, Social media, Websites, Messaging platform are in ON state. All these factors show that they have a direct effect on crime. Factors like Place of residence, Family history of violence, Demand level of dowry, Long term emotional of desensitization, extreme requirement for respect, feeling of low self-esteem, early misbehave with children, Bullied, standing with violence in house, community, or in media, which does not supposed to have a direct effect on violence by previous researchers or reports presented by many organizations have a significant influence on violence as we did not get 0 in the limit cycle at their place even we obtained I that represents they have a relationship with violence. Earlier results obtained using state-of-the-artfuzzy techniques were in the form of a state vector(1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1) = SA3. This was obtained with the help of FCMs in example represented by matrix in fig. 6. This clearly shows that uncertain factors are absent when situation is modelled using earlier approaches, signifying that studies conducted using FCMs are unable to present any situation in an effective way. The results obtained using NCMs are in the form of a fixed state vector (1 I I I I 1 I 1 I I I I I I I I I I I) = FA6. This shows the presence of indeterminate factors while identifying the traits of character for violence detection, clearly stressing on the importance of these factors. Now, we can say that NCMs are best to model real-life situation than FCMs. Presently, we can say that NCMs are ideal to display genuine circumstance than FCMs and address the meaning of vague elements in managing or breaking down genuine issues or circumstance.


The present work is significant in the sense that it identifies various traits of character taken from cloud and literature, leading to violent behaviors among the masses using Neutrosophic Cognitive Maps (NCMs). This is done in order to identify various factors mathematically while analyzing the situation of violence. NCMs are more efficient than FCMs since they work on the basis of Neutrosophic Fuzzy Sets (NFS) which is an extended version of Fuzzy Intuitionistic Sets (FIS), incorporating in itself the notion of indeterminacy or neutrality of facts. For the purpose of modeling, the work takes into account the determinate or certain factors together with indeterminate or uncertain factors, also uncertain and indeterminate relationship among them is considered. All the factors whether determinate or indeterminate are taken from the cloud-based data, experts’ opinions, and previous literature. The results have shown that uncertain, indeterminate, unknown factors and their relationship with certain or among themselves are equally important in order to interpret the violent behavior of the people which has not yet been considered in previous research. If uncertainty and indeterminacy are addressed at the data level itself, it will not impact the modeling stage and machine learning algorithms will perform well.

We conclude that while identifying the violent behavior using unsupervised data over the cloud, we cannot say anything for certain. Most of the time we face the indeterminacy of facts while analyzing this data over cloud and literature. If this uncertainty is not addressed at the data level, it may affect general pattern recognition models and machine learning algorithms. Hence the current work in this regard seems to be much more effective as it has focused on the indeterminacy and uncertainty of facts at the data level itself and has modeled the situation using Neutrosophy which is a powerful technique for handling imperfections in data.

The present work focussed on the limited factors obtained from literature and clouddata. The work has also not considered the various other types of indeterminacies like noise and redundant data that are required to be eliminated while detecting violence from videos. Therefore, these may be taken care of in the future. Also, future work in this regard could be the use of a knowledge graph while detecting violent behavior in video surveillance data over clouds. Also, neutrosophic sets could be extended to Single Valued Neutrosophic Sets and their application could be explored while modeling the data protection algorithms over the cloud. Also, machine learning algorithms can be designed incorporating a large amount of data already present over clouds using neutrosophic sets to reduce the indeterminacy. This will reduce time and space taken by ML algorithms in the learning phase and in return will lead to on-time accurate results and data protection over clouds. If this uncertainty in cloud data is resolved from the outset, an ensemble machine learning approach to feature extraction and fake news classification could be made successful. Additionally, it would improve retrieval technology for the internet of things with cloud assistance.

Availability of data and materials

The supporting data may be provided by corresponding author on request.

Change history


  1. Enforcement, C. L. Mexico: number of crimes 2021, by type. Available online via: mexico-type/, 2021

  2. Mauersberger C (2016) Argentina: Radical Change Amid Sharp Political Conflict. In: Advocacy Coalitions and Democratizing Media Reforms in Latin America. Springer, pp 83–147

    Chapter  Google Scholar 

  3. Fawcett B, Waugh F (2008) Addressing violence, abuse and oppression. Routledge

    Google Scholar 

  4. McKinnon L (2008) Hurting without hitting: Non-physical contact forms of abuse. Australian Domestic and Family Violence Clearinghouse, UNSW Sydney

    Google Scholar 

  5. Makkai T, Mouzos J (2011) Women’s experiences of male violence: findings from the Australian component of the International Violence Against Women Survey

    Google Scholar 

  6. UN. ESCAP, Australian Institute of Criminology, A.C.P.F. Implementation of United Nations mandates on juvenile justice administration in the ESCAP region, with a focus on youth in poverty., 1994


  8. Salama, H. A Missing Mandate? Casualty Recording in UN Peace Operations., 2020

  9. Anna Alvazzi del Frate, G.H.; LeBrun, E. Gender Counts: Assessing Global Armed Violence Datasets for Gender Relevance., 2020

  10. Hideg, G.; del Frate, A.A. Global Violent Deaths Scenarios., 2018

  11. Hideg, G.; del Frate, A.A. STILL NOT THERE Global Violent Deaths Scenarios., 2019

  12. Garbarino J, Crouter A (1978) Defining the community context for parent-child relations: The correlates of child maltreatment. Child development:604–616

  13. Bronfenbrenner U (1979) The ecology of human development: Experiments by nature and design. Harvard university press

    Google Scholar 

  14. Garbarino J, Abramowitz R, Asp E et al (1985) Adolescent development. An ecological perspective. Charles Merrill, Columbus, Ohio

    Google Scholar 

  15. Carp FM (2000) Elder abuse in the family, an interdisciplinary model for research. Gerontologist 40:500–502

    Google Scholar 

  16. Benlian A et al (2018) The transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J Manag Inf Syst 35(3):719–739

    Article  Google Scholar 

  17. Qian L et al (2009) Cloud computing: An overview. In: IEEE international conference on cloud computing. Springer, Berlin, Heidelberg

    Google Scholar 

  18. Onyema EM, Dalal S, Romero CAT et al (2022) Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. J Cloud Comp 11:26.

    Article  Google Scholar 

  19. Fenil E, Manogaran G, Vivekananda GN, Thanjaivadivel T, Jeeva S, Ahilan AJ (2019) Real time violence detection framework for football stadium comprising of big data analysis and deep learning through bidirectional LSTM. Comput Netw 14(151):191–200

    Google Scholar 

  20. Wajid MA, Zafar A (2022) Neutrosophic Image Segmentation: An Approach for the Treatment of Uncertainty in Multimodal Information Systems. Int J Neutrosophic Science 19(1):217–230.

    Article  Google Scholar 

  21. Onyema EM, Elhaj MAE, Bashir SG, Abdullahi I, Hauwa AA, Hayatu AS (2020) Evaluation of the Performance of K-Nearest Neighbor Algorithm in Determining Student Learning Styles. Int J of Innovative Sci, Eng & Techn 7(1):91–102

    Google Scholar 

  22. Adjah ESO, Agbemafle I (2016) Determinants of domestic violence against women in Ghana. BMC Public Health 16:1–9

    Google Scholar 

  23. PSNI, S.B. Police Recorded Crime in Northern Ireland., 2020

  24. Kaufman MR, Williams AM, Grilo G, Marea CX, Fentaye FW, Gebretsadik LA, Yedenekal SA (2019) “We are responsible for the violence, and prevention is up to us”: a qualitative study of perceived risk factors for gender-based violence among Ethiopian university students. BMC Womens Health 19:1–10

    Article  Google Scholar 

  25. Organization, W.H. World report on violence., 2018

  26. FORDHAM UNIVERSITY, Jesuit Research University, N.Y.C. Responding to a Student’s Threatening Behavior., 2016

  27. Notes, C. S. P. Predicting and Dealing with Violence., 2000

  28. Koenig MA, Stephenson R, Ahmed S, Jejeebhoy SJ, Campbell J (2006) Individual and contextual determinants of domestic violence in North India. Am J Public Health 96:132–138

    Article  Google Scholar 

  29. Mrug S, Madan A, Windle M (2016) Emotional desensitization to violence contributes to adolescents’ violent behavior. J Abnorm Child Psychol 44:75–86

    Article  Google Scholar 

  30. Francis L, Loxton D, James C (2017) The culture of pretence: a hidden barrier to recognising, disclosing and ending domestic violence. J Clin Nurs 26:2202–2214

    Article  Google Scholar 

  31. Prothrow-Stith D, Quaday S (1995) Hidden Casualties: The Relationship between Violence and Learning. Streamlined Seminar ERIC 14:n2

    Google Scholar 

  32. Devadoss AV, Felix A (2012) A new Bidirectional Associative Neutrosophic Cognitive Dynamical system approaches to study youth violence. international Journal of computer Applications:53


    Google Scholar 

  34. Etienne G. Krug, Linda L. Dahlberg, J.A.M.A.B.Z.; Lozano, R. World report on violence and health.;jsessionid=6C8FBE71BF2EFE2650866619FED5EF0C?sequence=1, 2002

  35. Health WHOM, Health SAM, Evidence WHOMH, Team R (2005) Mental health atlas 2005. World Health Organization

    Google Scholar 

  36. Pretus C, Hamid N, Sheikh H, Ginges J, Tobeña A, Davis R, Vilarroya O, Atran S (2018) Neural and behavioral correlates of sacred values and vulnerability to violent extremism. Front Psychol 9:2462

    Article  Google Scholar 

  37. Ginges J, Atran S, Sachdeva S, Medin D (2011) Psychology out of the laboratory: The challenge of violent extremism. Am Psychol 66:507

    Article  Google Scholar 

  38. Ginges J, Atran S, Medin D, Shikaki K (2007) Sacred bounds on rational resolution of violent political conflict. Proc Natl Acad Sci 104:7357–7360

    Article  Google Scholar 

  39. Dehghani M, Atran S, Iliev R, Sachdeva S, Medin D, Ginges J (2010) Sacred values and conflict over Iran’s nuclear program. Judgm Decis Mak 5:540

    Google Scholar 

  40. Altran S, Ginges J (2012) Religious and Sacred Imperatives. Science 336:6083

    Google Scholar 

  41. Sáez V (2015) A look into research of media, violence, and schools. Entramado 11:136–155

    Article  Google Scholar 

  42. Labrum T, Zingman MA, Nossel I, Dixon L (2021) Violence by persons with serious mental illness toward family caregivers and other relatives: A review. Harvard review of psychiatry 29:10–19

    Article  Google Scholar 

  43. Rutgers, The State University Of New Jersey, T.S.U.O.N.J. Contributing Factors., 2022

  44. CDCP. Risk and Protective Factors., 2020

  45. Martínez-Mascorro GA, Abreu-Pederzini JR, Ortiz-Bayliss JC, Terashima-Marín H (2020) Suspicious behavior detection on shoplifting cases for crime prevention by using 3D convolutional neural networks. arXiv preprint arXiv 2005:02142

    Google Scholar 

  46. Martínez-Mascorro GA, Abreu-Pederzini JR, Ortiz-Bayliss JC, Garcia-Collantes A, Terashima-Marín H (2021) Criminal Intention Detection at Early Stages of Shoplifting Cases by Using 3D Convolutional Neural Networks. Computation 9:24

    Article  Google Scholar 

  47. Martínez-Mascorro GA, Ortiz-Bayliss JC, Terashima-Marín H (2020) Detecting Suspicious Behavior on Surveillance Videos: Dealing with Visual Behavior Similarity between Bystanders and Offenders. 2020 IEEE ANDESCON. IEEE:1–7

  48. Lin C, Shao PC, Singh S (2014) Preventing Domestic Violence Via Education in Cloud Computing Service. In: The 2nd International Workshop on Learning Technology for Education in Cloud. Springer, Dordrecht

    Google Scholar 

  49. Sabri O (2015) Measuring is success factors of adopting cloud computing from enterprise overview. Proceedings of the The International Conference on Engineering & MIS 2015

  50. DeLone WH, McLean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. J Manag Inf Syst 19(4):9–30

    Article  Google Scholar 

  51. Freed D et al (2017) Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. In: Proceedings of the ACM on human computer interaction1 CSCW, pp 1–22

    Google Scholar 

  52. Singh A, Awasthi S, Wajid M (2018) Data storage security issues in cloud computing. In: ICCBI 2019: Proc. of the Int. Conf. on Computer Networks, Big Data and IoT, Madurai, India, pp 177–187

  53. Alkhater N, Walters R, Wills G (2018) An empirical study of factors influencing cloud adoption among private sector organisations. Telematics Inform 35(1):38–54

    Article  Google Scholar 

  54. Onyema EM et al (2020) Cloud security challenges: implication on education. Int J Comput Sci Mob Comput 9(2):56–73

    Google Scholar 

  55. Bhatt R et al (2022) Assessment of Dynamic Swarm Heterogeneous Clustering in Cognitive Radio Sensor Networks. In: Wireless Communications and Mobile Computing2022

    Google Scholar 

  56. Palanivinayagam A, Gopal SS, Bhattacharya S, Anumbe N, Ibeke E, Biamba C (2021) An Optimized Machine Learning and Big Data Approach to Crime Detection. Wireless Comm Mobile Comput:2021

  57. Siddiqi MA, Iwendi C, Jaroslava K, Anumbe N (2022) Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations. Math Biosci Eng 19(3):2641–2670

    Article  Google Scholar 

  58. Zhi C, Bao W (2020) Research on Video Violence Detection Technology of UAV on Cloud Platform. International Conference on Artificial Intelligence and Security, Springer, Singapore

    Book  Google Scholar 

  59. Kosko B (1986) Fuzzy cognitive maps. Int J Man-machine Stud 24:65–75

    Article  MATH  Google Scholar 

  60. Zafar A, Wajid MA (2019) Neutrosophic cognitive maps for situation analysis. Infinite Study

    Google Scholar 

  61. Smarandache F (2003) Definiton of neutrosophic logic-a generalization of the intuitionistic fuzzy logic. EUSFLAT Conf Citeseer:141–146

  62. Smarandache F (2001) First International Conference on Neutrosophy, Neutrosophic Logic, Set, Probability and Statistics. FlorentinSmarandache 4

  63. Smarandache, F. A unifying field in logics. neutrosophy: Neutrosophic probability, set and logic, 1999

  64. Abdel-Basset M, Gamal A, Chakrabortty RK, Ryan MJ (2021) Evaluation of sustainable hydrogen production options using an advanced hybrid MCDM approach: A case study. Int J Hydrog Energy 46:4567–4591

    Article  Google Scholar 

  65. Abdel-Basset M, El-Hoseny M, Gamal A, Smarandache F (2019) A novel model for evaluation Hospital medical care systems based on plithogenic sets. Artif Intell Med 100:101710

    Article  Google Scholar 

  66. Abdel-Basset M, Saleh M, Gamal A, Smarandache F (2019) An approach of TOPSIS technique for developing supplier selection with group decision making under type-2 neutrosophic number. Appl Soft Comput 77:438–452

    Article  Google Scholar 

  67. Wajid MA, Zafar A (2021) Multimodal Fusion: A Review, Taxonomy, Open Challenges, Research Roadmap and Future Directions. Neutrosophic Sets and Systems:45

  68. Wajid M, Zafar A (2021) PESTEL Analysis to Identify Key Barriers to Smart Cities Development in India. Neutrosophic Sets and Systems:42

  69. Zafar A, Wajid MA (2020) A Mathematical Model to Analyze the Role of Uncertain and Indeterminate Factors in the Spread of Pandemics like COVID-19 Using Neutrosophy: A Case Study of India, vol 38. Infinite Study

    Google Scholar 

  70. Dhar M, Broumi S, Smarandache F (2014) A note on square neutrosophic fuzzy matrices. Infinite Study

  71. Kandasamy WV, Smarandache F (2004) Fuzzy relational maps and neutrosophic relational maps, vol 3. Infinite Study

    MATH  Google Scholar 

  72. Kandasamy V, Ilanthenral K, Smarandache F (2015) Neutrosophic graphs: A new dimension to graph theory. Infinite Study

  73. Srinivas; Shekar. Cognitive maps., 1997

  74. Kandasamy WV, Smarandache F (2003) Fuzzy cognitive maps and neutrosophic cognitive maps. Infinite Study

  75. Calefariu E, Boscoianu M, Smarandache F, Buda TA (2014) Neutrosophic Modeling of Investment Architectures. Applied Mechanics and Materials Trans Tech Publ 657:1011–1015

    Article  Google Scholar 

  76. Ehrlinger L, Wöß W (2016) Towards a Definition of Knowledge Graphs. SEMANTiCS (Posters, Demos, SuCCESS) 48:2

    Google Scholar 

  77. Mika P, Bernstein A, Welty C, Knoblock C, Vrandeˇci’c D, Groth P, Noy N, Janowicz K, Goble C (2014) The Semantic Web–ISWC 2014: 13th International Semantic Web Conference, Riva del Garda, Italy, October 19–23, 2014. Proceedings, Part II; 8797. Springer

    Book  Google Scholar 

  78. Poczeta K, Papageorgiou EI, Gerogiannis VC (2020) Fuzzy Cognitive Maps Optimization for Decision Making and Prediction. Mathematics 8:2059

    Article  Google Scholar 

  79. Smarandache F (2021) Indeterminacy in Neutrosophic Theories and their Applications. Infinite Study

    Book  Google Scholar 

  80. Broumi S, Bakali A, Talea M, Smarandache F, Dey A et al (2018) Spanning tree problem with Neutrosophic edge weights. Procedia Computer Science 127:190–199

    Article  Google Scholar 

  81. VasanthaKandasamy W, Smarandache F et al (2016) Strong Neutrosophic Graphs and Subgraph Topological Subspaces. arXiv e-prints:arXiv–1611

  82. Wajid MS, Wajid MA (2021) The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Case Study of South Africa Using Neutrosophy. Neutrosophic Sets and Systems 41(2021):15

    Google Scholar 

  83. Smarandache F (2000, 2000) Collected Papers III. EdituraAbaddaba, Oradea

    MATH  Google Scholar 

  84. Smarandache, F. Proceedings of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Porbability and Statistics: Www. Gallup. Unm. Edu/˜ Smarandache/NeutrosophicProceedings. Pdf; Infinite Study, 2003

Download references


We would like to gratefully acknowledge the CONACYT (Consejo Nacional de Ciencia y Tecnolog ́ıa) &Tecnológico de Monterreyfor funding this project.


This research was funded by CONACYT (Consejo Nacional de Ciencia y Tecnolog ́ıa) &Tecnológico de Monterrey.

Author information

Authors and Affiliations



Mohammad Saif Wajid carried out the experiment and wrote the manuscript with support from Dr. HugoTerashimaMarin, Dr.PeymanNajafirad Paul Rad and Mohd. Anas Wajid. Dr. HugoTerashimaMarin and Dr.PeymanNajafirad Paul Rad supervised the whole project. Mohd. Anas Wajid contributes to results and analysis. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Mohammad Saif Wajid.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: the author last name was not mentioned correctly. It was Peyman Najafirad (Paul Rad). It should be Peyman Najafirad Paul Rad.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wajid, M.S., Terashima-Marin, H., Paul Rad, P.N. et al. Violence Detection Approach based on Cloud Data and Neutrosophic Cognitive Maps. J Cloud Comp 11, 85 (2022).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: