Child Abusing and Reporting System
Ahlam Ansari1 , Salim Mapkar2 , Ashad Shaikh3 , Maaz Khan4
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 331-333, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.331333
Online published on Mar 31, 2019
Copyright © Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan, “Child Abusing and Reporting System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.331-333, 2019.
MLA Style Citation: Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan "Child Abusing and Reporting System." International Journal of Computer Sciences and Engineering 7.3 (2019): 331-333.
APA Style Citation: Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan, (2019). Child Abusing and Reporting System. International Journal of Computer Sciences and Engineering, 7(3), 331-333.
BibTex Style Citation:
@article{Ansari_2019,
author = {Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan},
title = {Child Abusing and Reporting System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {331-333},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3840},
doi = {https://doi.org/10.26438/ijcse/v7i3.331333}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.331333}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3840
TI - Child Abusing and Reporting System
T2 - International Journal of Computer Sciences and Engineering
AU - Ahlam Ansari, Salim Mapkar, Ashad Shaikh, Maaz Khan
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 331-333
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
409 | 235 downloads | 172 downloads |
Abstract
In many countries like India, Child abuse is one of the major social evil leading to poor emotional health of the future citizens. Child abuse and neglect occur in different situations, for a different range of reasons at different places. Children often experience more than one form of abuse at a time. The abuse can take many forms such as physical, emotional, psychological, neglect, domestic violence etc. Recent research by McGill University (2015) showed that emotional abuse of a child may be as harmful as physical abuse and neglect. A child facing abuse in any of the above forms is at risk of being isolated; experience anxiety, depression, and mental trauma; face difficulties in learning and developing social relations. Although there have been many initiatives by NGOs and government and other welfare departments to stop this evil by registering a complaint against the abuser, conducting campaigns, by protesting against abuse and so on. These schemes are only carried out if the crime has already taken place. Thus the abuser can be punished according to the Child Protection and Safety Act but the negative impact it had left on the child remains. This can only be reduced if the responsible guardians or parents are alerted beforehand by an intelligent system, so that they can act in time to protect their child from this terrible faith.
Key-Words / Index Term
Child abuse, Raspberry pi 3b+,Voice recognition API
References
[1] Mazlan Bin Che Soh, Nur Qistiena Nodin, Muhammad Hafiz Arshad, “Child abuse: A study on public perceptions about relationship between demographic factors and level of awareness towards child abuse”, IEEE Symposium Humanities, Science and Engineering Research (SHUSER),2012.
[2] S. Ansari, R. Siddique, R. Hamdulay, R. Quraishi and S. Samiya, "Real-Time Child Abuse and Reporting System," 2018 Fourth International Conference on Advances in Electrical, Electronics,Information, Communication and Bio-Informatics (AEEICB).
[3] Maksimovic, Mirjana & Vujovic, Vladimir & Davidović, Nikola & Milosevic, Vladimir & Perisic, Branko. (2014). Raspberry Pi as Internet of Things hardware: Performances and Constraints.
[4] Dhruv Chand M, Sreecharan Sankaranarayanan,Chandramouli Sharma “Project Jagriti: Crowdsourced child abuse reporting”, Global Humanitarian Technology Conference (GHTC), 2014
[5] C.-C. Chiu, T. N. Sainath, Y. Wu, R. Prabhavalkar, P. Nguyen,Z. Chen, A. Kannan, R. J.Weiss, K. Rao, K. Gonina et al., “Stateof-the-art speech recognition with sequence-to-sequence models,” arXiv preprint arXiv:1712.01769, 2017.
[6] W. McKinney, pandas: a python data analysis library.
[7] Bird , S. (2006). NLTK: The natural language toolkit. In Proceedings of the COLING/ACL on interactive presentation sessions (pp. 69–72). Association for Computational Linguistics.