Investigative Data Mining and its Application in Counterterrorism Nasrullah Memon 1, Abdul Rasool Qureshi 2,

Size: px
Start display at page:

Download "Investigative Data Mining and its Application in Counterterrorism Nasrullah Memon 1, Abdul Rasool Qureshi 2,"

Transcription

1 2 Investigative Data Mining and its Application in Counterterrorism Nasrullah Memon 1, Abdul Rasool Qureshi 2, 1 Software Intelligence Security Research Center, Aalborg University Niels Bohrs Vej 8, 6700, Esbjerg, Denmark nm@sis-rc.org Software Developer, iminer Development Team parqureshi@yahoo.com Abstract-It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patterns of interest, such as patterns indicating an organized crime activity. An important problem targeted by IDM is identification of terror/crime networks, based on available intelligence and other information. We present an approach to an IDM solution of this problem, using semantic link analysis and visualization of findings. The approach is demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, and funds transfer, etc. The findings are represented by a network in the form of an attributed relational graph. Paths from a node to any other node in the network indicate the relationships between individuals and organizations. The system also provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will likely destabilize the terrorist network. Key-Words: - Terrorism, Counterterrorism, Investigative Data Mining, Link Analysis, Visualization 1 Introduction When intelligence analysts are required to understand a complex uncertain situation, one of the techniques they use often to simply draw a diagram of the situation. The diagrams are attributed relational graphs, an extension of the abstracted directed graph [1]. In these graphs, nodes represent people, organizations, objects, or events. Edge represents relationship like interaction, ownership, or trust. Attributes store the details of each node and edge, like person s name, or interactions time of occurrence. The graphs function as external memory aids, which are crucial tools for arriving an unbiased conclusion in the face of uncertain information [2] For example, if we have information that Osama-bin-Laden is a friend of Ayman-al-Zawahiri, who is father of Khalid-al-Zawahiri, who frequents at Al-Qaeda House Afghanistan, as does Abu-Bakar-Bashir, Hud-bin-AbdulHaq and Muhammad Atta who works at Hay Computing Service Hamburg, where he has a colleague Ramzi-bin-al-Sibh who provided funds to Marwan-al-Shehhi who is friend of Zakarya-Essabar who is brother of Mounir-al-Motassadek, then this information may be presented as in Figure 1. Visualizing the connections in this way is of importance in investigating of terrorist or criminal networks. It has been found to aid considerably a good understanding of what is known so far, which is necessary to guide and direct further lines of inquiry in the most timely and productive way. In an investigation of a suicide terrorist attack, with an unknown perpetrator, say, we may well begin by investigating the social network of the victims, their friends, the places they visit, their work colleagues, and so on in looking for possible motives of and suspects; and then build a link chart to clearly understand what we know so far as we proceed. Fig 1: The connection between a set of people displayed as network In countering terrorism for homeland security, understanding data, information, and intelligence gathered so far in a terrorist threat investigation is of great importance for guiding the future course of the investigation. Such information is typically best comprehended when viewed as a network if the connections between the objects of interest in the problem domain, such as people, financial transactions, meetings, and travel records. By analyzing the 9/11 terrorist network, it is clear that one of Al Qaeda s criteria for selecting the hijackers almost certainly was that they were

2 relatively clean [3]. For example, Muhammad Atta and some of the other 9/11 hijackers were never even considered candidates for the watch lists as intelligence reporting had not previously associated them with known terrorists [3]. The terrorist networks are highly decentralized in comparison to social networks; however, even a decentralized terrorist threat has some linkage. It is the challenge to the intelligence community to exploit these links. Within the networks of extremists, almost everyone can be linked at least indirectly, such as through their past common experiences. Intelligence services cannot monitor all of these contacts for compiling the life history of every extremist who has the potential to become a terrorist. Detecting the perpetrators of the next terrorist attack will therefore have to go beyond link analysis and increasingly rely on other techniques for identifying the terrorists for closer monitoring. Mining of financial, travel, and other data on personal actions and circumstances, is one such technique. The potential of such data mining goes well beyond current usage. Yet, Data Mining for counterterrorism (we call it as Investigative Data Mining) purposes will always require a major investment in obtaining and manipulating the data in return for only modest narrowing of the search for terrorists. The remainder of the paper is organized as follows: Section 2 introduces investigative data mining approach and also provides a clear overview how it distinguishes from the traditional data mining; Section 3 presents a detailed review on link analysis techniques; Section 4 describes investigative data mining view of link analysis. Section 5 reviews some SNA techniques that could be used in finding terrorist threats. Section 6 introduces the system architecture of investigative data mining software; while Section 7 introduces a new strategy of neutralization of terrorist network. Section 8 provides conclusion of this paper. 2 Investigative Data Mining The rapid growth of available data in all regions of society requires new computational methods. Besides traditional statistical techniques [4] and standard database approaches, current research known as Investigative Data Mining (IDM) uses modern methods that originate from research in Algorithms and Artificial Intelligence. The main goal is the quest for interesting and understandable patterns. This search always been and will always be critical task in law enforcement, especially for criminal investigation, and more specific for the fight against terrorism. Examples are the discovery of interesting links between people (Social networks, see, e.g., [5]) and other entities (means of transport, modus operandi, locations, communication channels like phone numbers, accounts, financial transactions and so on). IDM is defined as: The technique which models to data to predict behaviour assesses risk, determine associations and help in neutralizing the terrorist network [6, 7] IDM differs from traditional data mining applications in significant ways. Traditional data mining are generally applied against large transaction databases in order to classify people according to transaction characteristics and extra pattern in widespread applicability. The problem in IDM is to focus on smaller number of subjects within large background population and identify links and relationships from a far wider variety of activities. Table 1 states how investigative data mining is distinguished from the traditional data mining. Table 1. Traditional Data Mining Vs. Investigative Data Mining Traditional Data Mining Classifying propositional Data from large data sets (transactions) To extract patterns of general applicability Identify patterns among unrelated subjects based on their transaction patterns in order to make predictions about their unrelated subjects doing the same things Investigative Data Mining Extracting Relational Data from large heterogeneous data sets (people, places, things, events, transactions, etc.) To find rare but significant relational links Identify patterns that evident organizations and activities among related subjects in order to express additional related (or like) subjects or activities Access risk of the threat Neutralize terrorists network In the area of law enforcement the need for IDM is apparent in view of enormous load of information that is (and can be made) available nowadays. We list some of the problems. First, incomplete, incorrect, or inconsistent data can create problems. Moreover, these characteristics of terrorist networks cause difficulties: -Incompleteness. Terrorist networks are covert networks that operate in secrecy and stealth [8]. Terrorists may minimize interactions to avoid attracting law enforcement attention and their interactions are hidden behind various illicit activities. Thus, data about terrorists and their interactions and associations is inevitably incomplete, causing missing nodes and links in the networks [9].

3 -Incorrectness. Incorrect data regarding terrorists identities, physical characteristics, and addresses may result either from unintentional data entry errors or from intentional deception by terrorists. Many terrorists lie about their identity information when caught and investigated. -Inconsistency. Information about a terrorist who has multiple police contacts may be entered into law enforcement databases multiple times. These records are not necessarily consistent. Multiple data records could make a single terrorist appear to be different individuals. When seemingly different individuals are included in a network under study, misleading information may result. Problems specific to terrorist network analysis lie in network dynamics, fuzzy boundaries and data transformation: -Terrorist networks are not static, but are subject to changes over time. New data and even new methods of data collection may be required to capture the dynamics of terrorist networks [9]. -Boundaries of terrorist networks are likely to be ambiguous. It can be quite difficult for the analyst to decide whom to include and whom to exclude from a network under study [9]. -Data Transformation. Network analysis requires that data be presented in specific format, in which network members are represented by nodes, their associations are represented by links. However information about terrorist associations from raw data and transforming them to the required format can be laborious and time-consuming. 3 Link Analysis (Terrorist Network Analysis) The data mining technologies like link analysis (LA) can be employed by law enforcement investigators and intelligence analysts to help them to examine graphically the anomalies and inconsistencies; and connect networks of relationships, and contacts hidden in the data. LA is the first level by which networks of people, places, organizations, vehicles, bank accounts, telephone calls, contacts, and other tangible entities can be discovered, linked, assembled, examined, detected, and analyzed. Effectively combining multiple sources of data can lead law enforcement investigators and government analysts to discover patterns to help them be more proactive in their investigations. LA is good start in mapping terrorist activity and criminal intelligence by visualizing association between entities and events. LA is often involves seeing via a chart or map the associations between suspects and locations, whether physical or on network or the Internet. The technology is often used to answer such questions as who knows whom and when and where they been in contact? LA is the process of building up networks of interconnected objects through relationships in order to expose patterns and trends. LA uses item-to-item associations to generate networks of interactions and connections from defined datasets. LA diagrams have variety of names ranging from entity-relationship-diagrams and connected networks to nodes-and-links and directed graphs. LA methods add dimensions to an analysis that the other forms of visualization do not support. By explicitly representing relationships among objects, an investigator can gain an entirely different perspective on how the data can be analyzed and the types of patterns that can be discovered. LA provides a powerful means of performing visual data mining, particularly if an investigator knows how to take advantage of layout options, filter assessments, and presentation formats. Used properly LA systems allow to identify patterns, merging groups, and generate connections quickly. LA can be used to expose the underlying patterns and behaviours pertaining to national security and homeland defense related to such areas as terrorism and drug trafficking. The intelligence community can use LA to sift through vast amount of data looking for connections, relationships, and critical links among their suspected targets. LA reveals the structure and content of a body of information by representing it as a set of interconnected linked objects or entities. Often LA allows an investigator to identify association patterns, new emerging groups, and connection between suspects. Through the visualization of these entities and links, an investigator can gain an understanding of the strength of relationships and frequency of contacts and discover new hidden associations [10, 11] Criminal Network Analysis, which is a broad category of terrorist network analysis categorized into three generations [12] First generation: Manual approach. Representative of the first generation is the Anacapa Chart [13]. With this approach, an analyst must first construct an association matrix by identifying criminal associations from raw data. A link chart for visualization purposes can then be drawn based on the association matrix. For example, to map the terrorist network containing the 19 hijackers in the September 11 attacks, Krebs [8] gathered data about the relationships among the hijackers from publicly released information reported in several major newspapers. He then manually constructed an association matrix to integrate these relations [8] and drew a network representation to analyze the structural properties of the network (Figure 2).

4 Fig Terrorist Network Although such a manual approach for criminal network analysis is helpful in crime investigation, it becomes an extremely ineffective and inefficient method when data sets are very large. Second generation: Graphic-based approach. These tools can automatically produce graphical representations of criminal networks. Most existing network analysis tools belong to this generation. Among them Analyst's Notebook [12], Netmap [14], and XANALYS Link Explorer (previously called Watson) [15], are the most popular. For example, Analyst's Notebook can automatically generate a link chart based on relational data from a spreadsheet or text file. Second-generation network analysis approaches have been developed by the COPLINK research at University of Arizona. The first approach employs a hyperbolic tree metaphor to visualize crime relationships [16]. It is especially helpful for visualizing a large amount of relationship data because it simultaneously handles both focus and context. Second-generation tools are also capable of using various methods to visualize criminal networks; their sophistication level remains modest because they produce only graphical representations of criminal networks without much analytical functionality. They still rely on analysts to study the graphs with awareness to find structural properties of the network. Third generation: SNA. This approach provides ore advanced analytical functionality to assist crime investigation. Sophisticated structural analysis tools are needed to go from merely drawing networks to mining large volumes of data to discover useful knowledge about the structure and organization of criminal networks. 4 IDM Perspective of Terrorist Network Analysis Intelligence and law enforcement agencies are often interested in finding structural properties of terrorist networks. This study aims to answer the following questions: 1. What is the overall structure of the network? And what are the different roles within the network? And who is the central or peripheral in the network? 2. What cells (subgroups) exist in the network? And how do these cells interact with each other? 3. What are the important communications and method of communication? And which individuals might be more likely to give information to the intelligence agencies? And which individual should be removed to disrupt the network? The prototype iminer could be helpful for investigative personnel to target critical network members for removal or surveillance, and locate network vulnerabilities where disruptive action can be effective. 5 SNA Techniques SNA techniques are designed to discover patterns of interaction between social actors in social networks [11], they are especially appropriate for studying terrorist networks [18, 9]. Specifically, SNA is capable of detection of terrorist cells, discovering their patterns of interaction, identifying central and peripheral individuals, finding leaders, followers and gatekeepers, and uncovering network organization and structure [17]. Centrality deals with the roles of individuals in a network. Several centrality measures, such as degree, betweenness, and closeness can suggest the importance of a node in a network. The degree of a particular node is its number of links; its betweenness is the number of geodesics (shortest paths between any two nodes) passing through it; and its closeness is the sum of all geodesics between the particular node and every other node in the network. An individual s having high degree, for instance may imply his leadership; whereas an individual with high betweenness may be a gatekeeper in the network. Krebs [8] found that in the network consisting 19 hijackers, Mohamed Ata scored the highest on degree and closeness, but not on the betweenness. There also many other measures like blockmodeling, etc. can be used in terrorist networks. 6 iminer iminer is an experimental system, which provides the answers of the questions described in section 4. The system architecture of our prototype is presented in figure 3. The first stage of our network analysis development was intended to automatically identify the strongest association paths, or geodesics, between two or more network members using shortest path algorithms. In practice, such task often entails intelligence officials to manually explore links and try to find association paths that might be useful for generating investigative leads.

5 is developed as a result of processing the links retrieved from database by Graph Maker. iminer is window based implementation of IDM framework with new algorithms for visualization, filtering and destabilization of terrorist networks. Fig 3. System Architecture 6.1 Database Perspective We stored data in the database in the form of triples, <subject, object, relationship> Where subject and objects may be entities of interest and relationship is link between two entities. The entities are saved in Database in Entity_Profile table, which has the fields (Entity_key, Entity_name, Entity_type). The relationships are saved in sequence of their involvement in a certain terrorism plot. For example, all the relationships, which are involved in the 9-11 Terrorist Attack, are saved together thus forming the events. Each event has a table of relations (in which relations are stored in above given format) and each event is registered in the events master table. These events are analogous to case files in local police stations. The different attributes of each entity are saved in separate tables, which are joined with entities using entity_key. As shown in figure 2, AT tables represent attribute tables, while EP and DP represents entities master table and events master table. The tables with R are relations tables, each table represent a distinct event. 6.2 Application Perspective Database wrappers consist of classes, which serve as wrappers to tables used in our database architecture, control the flow of information to and from these wrappers. The Database Settings Manager holds the values of different attributes, which are used in searches. The Database Settings Manager controls whether search is done on an event or in whole database? The queries for search are generated automatically. User has just set the attribute values. Importer actually imports data from files of different formats like CSV files, XML files etc. This data could be saved in the database (and for this purpose the importer transforms data using database wrappers and saves it in database). The data, which concedes to current database search settings, are then used by Graph Maker, which analyzes the data and transform into the graph. This graph is abstract and cannot be drawn directly on screen for visualization. For visualization we have used the open Source Library prefuse [19]. To convert graph to perfuse recognizable format, graph special converters are designed. These converters convert the graph, which 7 Neutralization of Terrorist Networks For neutralization of terrorist network, we have used centrality measures from SNA literature i.e. degree centrality and Eigen vector centrality. The algorithm1 is used to convert undirected graph to a directed graph. While algorithm2 we constructed hierarchy from the directed graph. Hierarchy shows who is in the power of whom, i.e. who is central or peripheral in the network Algorithm 1: To convert undirected graphs into directed graphs Algorithm2: To construct a hierarchy from a directed graph. 1. Identify the nodes from which 1 or the more edges are originating and repeat each of the step from 2 to 4 for each node 2. Taking the node with minimum number of edges originating and traverse it s each edge. 3. Every node adjacent to the current edge will be placed under its predecessor, if no other edge is pointing towards it. 4. If any other edge is pointing towards it, then it will be placed under the node that has more links directing to its neighbourhood.

6 Results: We applied the algorithms on the network of alleged 9-11 hijackers, we found that power is originating from Nawaf Al Hazmi, Hamza Alghamdi and Marvan-Al-shehhi. Also if we follow the arrows, the dotted line in hierarchy shows may be. It is crystal clear from Fig. 5 that there are 4 groups. In the first group Nawaf Alhazmi is leading Hani Hunjor, Majed Moqed, Khalid Mindhar and Saleem Alghadmi which is 100% reality. This group hijacked Flight AA #77, which crashed into pentagon. The doted Line from Nawaf Alhazmi to Saeed Alghamdi also reveals that Nawaf Al Hazmi may also influence Saeed Alghamdi and its group. The other group extracted from the results of above given algorithm lead by Saeed Alghamdi and consisting of Ahmed Alnami, Zaid Jarah, Ahmed Alhaznawi. This group in reality drove the flight UA# 93 crushed in Pennsylvania. The 3 rd group lead by Hamza Alghamdi, other members of group were Fayyez Ahmed, Mohand Alshehri, Ahmed Alghamdi. Where there is a (may be) dotted link which shows Fayyaz Ahmed follows Marvan Alshehhi. Now if we consider this "may be" (shown by dotted line) statement as true then it becomes 100% reality, otherwise Marvan Al shehhi was missing from group. The last group which consists of Marvan Al shehhi,mohamed Atta, Abdel Aziz Al-omairi, Wail Al-shehri, Waleed al shehri and Satam Suqami was also true but there is only 1 diversion that Marvan Al shehhi was not the member of that group. But at least the results are showing it an important member. The law enforcement people may use the same strategy for neutralization of terrorist networks. This type of hierarchy will definitely help law enforcement to use energies in capturing a useful node (node) so that maximum of the network is disrupted. Table 2. Showing degree and Eigen Vector Centrality Fig. 4: directed Graph Fig. 5 Hierarchy of 9-11 terrorists 8 Conclusion and Future Work The motivation behind the work described in this paper is to provide better database interface support for an established method of visually analyzing the data, when data is stored in a database. Several visual data analysis tools provide support for construction and analysis of link charts, such as Automated Tactical Analysis of Crime (ATAC), Analyst s Notebook, Crime Link, Crime Workbench, Daisy, NetMap, ORION, VisualLink [10]. The above software are only for the investigation of the links. But the software under development, iminer, will not only find the links available in the database, but it ll also help the law enforcement in destabilizing the network. References [1] Coffman Thayne, Greenblatt Seth, and Marcus Sherry. Graph-Based Technologies for Intelligence Analysis. Communications of the ACM, 2003, vol 47, No. 03, pp [2] Heuer, R.J. Psychology of Intelligence Analysis. Center for the study of Intelligence, Central Intelligence Agency, [3] Paul R. Pillar. Counterterrorism after Al Qaeda. The Washington Quarterly. 27 (3) pp [4] T. Hastie et el. The Elements of Statistical Learning: Data Mining, Inference and Prediction. Springer [5] V.E. Krebs. Unlocking Terrorist Networks. First Monday, 7, issue 4, April [6] Memon Nasrullah et al. Investigative Data Mining: Issues and Challenges. In the proceedings of the First International Computer Engineering Conference (ICENCO 2004) Cairo, EGYPT, pages , [7] Memon Nasrullah et al. Investigative Data Mining: A General Framework. In the proceedings of International Conference on Computational Intelligence (ICCI2004), ISBN , pages , [8] Krebs, V. E. Mapping networks of terrorist cells. Connections 24, 3 (2001), [9] Sparrow, M.K. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13 (1991),

7 [10] Jesus Mena. Investigative Data Mining for Security and Criminal Detection. Butterworth Heinmann, [11] Harper R. Walter, and Harris H. Douglas. The Application of Link Analysis to Police Intelligence. Human Factors, 1975, 17(2), [12] Klerks, P. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24, 3 (2001), [13] Harper, W.R., and Harris, D.H. The application of link analysis to police intelligence. Human Factors 17, 2 (1975), [14] Goldberg, H.G., and Senator, T.E. Restructuring databases for knowledge discovery by consolidation and link formation. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis. AAAI Press (1998). [15] Anderson, T., Arbetter, L., Benawides, A., and Longmore-Etheridge, A. Security works. Security Management 38, 17, (1994), [16] Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., and Schroeder, J. COPLINK: Managing law enforcement data and knowledge. Commun. ACM 46, 1 (Jan. 2003), [17] Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge, MA, [18] McAndrew, D. The structural analysis of criminal networks. The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. D. Canter and L. Alison (Eds.). Aldershot, Dartmouth (1999). [19] Heer Jeffrey, Card K. Stuart, and Landay A. James. Prefuse: A toolkit for interactive information visualization. In the Proceedings of CHI2005, Portland, Orgon, USA. [20] Carely M. Cathleen, Lee S.J., Krackhardt David, Destabilizing Networks, Connections 4.

Mapping Networks of Terrorist Cells

Mapping Networks of Terrorist Cells CONNECTIONS 24(3): 43-52 2002 INSNA Mapping Networks of Terrorist Cells Valdis E. Krebs orgnet.com This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly

More information

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes,

More information

A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes

A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management

More information

How To Understand The Benefits Of Big Data Analysis

How To Understand The Benefits Of Big Data Analysis Ioana-Brînduşa Bogdan Masterand Faculty of Mathematics and Informatics Spiru Haret University Bucharest, Romania bicuioana@yahoo.com THE BENEFITS OF BIG DATA ANALYTICS Abstract: The wealth of information

More information

Data Mining for Digital Forensics

Data Mining for Digital Forensics Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Crime Pattern Analysis

Crime Pattern Analysis Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation

More information

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES 43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona

More information

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under

More information

A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH

A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH 205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology

More information

KEYWORD SEARCH IN RELATIONAL DATABASES

KEYWORD SEARCH IN RELATIONAL DATABASES KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to

More information

The Role of Social Network Analysis in Intelligence-Led Policing

The Role of Social Network Analysis in Intelligence-Led Policing The Role of Social Network Analysis in Intelligence-Led Policing Charles M. Katz, Arizona State University (ASU) Andrew Fox, University of Missouri Kansas City Michael White, ASU David Choate, ASU October

More information

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL

FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL FEATURE SPECIFIC CRIMINAL MAPPING USING DATA MINING TECHNIQUES AND GENERALIZED GAUSSIUN MIXTURE MODEL Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University

More information

Security Concerns in Electronic Payments. Major Forms of Government Electronic Payment

Security Concerns in Electronic Payments. Major Forms of Government Electronic Payment Security Concerns in Electronic Payments Scott Dueweke VP, Government and Security Concord EFS, Inc. Major Forms of Government Electronic Payment Consumer credit cards Debit cards Purchasing cards Electronic

More information

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

VISUALIZATION. Improving the Computer Forensic Analysis Process through

VISUALIZATION. Improving the Computer Forensic Analysis Process through By SHELDON TEERLINK and ROBERT F. ERBACHER Improving the Computer Forensic Analysis Process through VISUALIZATION The ability to display mountains of data in a graphical manner significantly enhances the

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Project Knowledge Management Based on Social Networks

Project Knowledge Management Based on Social Networks DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Big Data s Big Impact In Financial Investigations

Big Data s Big Impact In Financial Investigations Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Big Data s Big Impact In Financial Investigations

More information

CSIS REPORT DATA MINING DATA ANALYSIS COUNTERTERRORISM AND FOR. Author Mary DeRosa ISBN 0-89206-443-9 THE CENTER FOR STRATEGIC & INTERNATIONAL STUDIES

CSIS REPORT DATA MINING DATA ANALYSIS COUNTERTERRORISM AND FOR. Author Mary DeRosa ISBN 0-89206-443-9 THE CENTER FOR STRATEGIC & INTERNATIONAL STUDIES CSIS REPORT DATA MINING AND DATA ANALYSIS FOR COUNTERTERRORISM Author Mary DeRosa ISBN 0-89206-443-9 THE CENTER FOR STRATEGIC & INTERNATIONAL STUDIES 1800 K Street, NW Washington, DC 20006 Telephone: (202)

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Data Mining Applications in Higher Education

Data Mining Applications in Higher Education Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2

More information

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

Visualizing e-government Portal and Its Performance in WEBVS

Visualizing e-government Portal and Its Performance in WEBVS Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

How to Analyze Company Using Social Network?

How to Analyze Company Using Social Network? How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

Topic Maps Visualization

Topic Maps Visualization Topic Maps Visualization Bénédicte Le Grand, Laboratoire d'informatique de Paris 6 Introduction Topic maps provide a bridge between the domains of knowledge representation and information management. Topics

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

A Survey on Terrorist Network Mining: Current Trends and Opportunities

A Survey on Terrorist Network Mining: Current Trends and Opportunities A Survey on Terrorist Network Mining: Current Trends and Opportunities Nisha Chaurasia 1, Mradul Dhakar 1, Akhilesh Tiwari 2 and R. K. Gupta 2 1 MTech Student, Department of CSE & IT, MITS Gwalior, M.P.,

More information

APPLICATION OF DATA MINING TECHNIQUES FOR BUILDING SIMULATION PERFORMANCE PREDICTION ANALYSIS. email paul@esru.strath.ac.uk

APPLICATION OF DATA MINING TECHNIQUES FOR BUILDING SIMULATION PERFORMANCE PREDICTION ANALYSIS. email paul@esru.strath.ac.uk Eighth International IBPSA Conference Eindhoven, Netherlands August -4, 2003 APPLICATION OF DATA MINING TECHNIQUES FOR BUILDING SIMULATION PERFORMANCE PREDICTION Christoph Morbitzer, Paul Strachan 2 and

More information

Viral Marketing in Social Network Using Data Mining

Viral Marketing in Social Network Using Data Mining Viral Marketing in Social Network Using Data Mining Shalini Sharma*,Vishal Shrivastava** *M.Tech. Scholar, Arya College of Engg. & I.T, Jaipur (Raj.) **Associate Proffessor(Dept. of CSE), Arya College

More information

Visualization in Argument Based Recommender System

Visualization in Argument Based Recommender System Visualization in Argument Based Recommender System Preeti #, Ankit Rajpal #, Purnima Khurana * # Assistant Professor,Department of Computer Science Deen Dayal Upadhaya College, University of Delhi, Delhi,

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Discovering Hidden Networks in On-line Social Networks

Discovering Hidden Networks in On-line Social Networks I.J. Intelligent Systems and Applications, 2014, 05, 44-54 Published Online April 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2014.05.04 Discovering Hidden Networks in On-line Social Networks

More information

Social Network Analysis and Simulation of the Development of Adversarial Networks

Social Network Analysis and Simulation of the Development of Adversarial Networks Social Network Analysis and Simulation of the Development of Adversarial Networks Razvan Orendovici, Computer Science and Engineering Frank E. Ritter, College of IST Pennsylvania State University University

More information

FREEDOM OF INFORMATION REQUEST

FREEDOM OF INFORMATION REQUEST FREEDOM OF INFORMATION REQUEST Request Number: F-2013-05371 Keyword: Operational Policing Subject: Unmanned Aerial Systems (UAS) Purchased By PSNI 2012-2013 Request and Answer: Question 1 The number of

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

City Data Pipeline. A System for Making Open Data Useful for Cities. stefan.bischof@tuwien.ac.at

City Data Pipeline. A System for Making Open Data Useful for Cities. stefan.bischof@tuwien.ac.at City Data Pipeline A System for Making Open Data Useful for Cities Stefan Bischof 1,2, Axel Polleres 1, and Simon Sperl 1 1 Siemens AG Österreich, Siemensstraße 90, 1211 Vienna, Austria {bischof.stefan,axel.polleres,simon.sperl}@siemens.com

More information

Social Network Analysis using Graph Metrics of Web-based Social Networks

Social Network Analysis using Graph Metrics of Web-based Social Networks Social Network Analysis using Graph Metrics of Web-based Social Networks Robert Hilbrich Department of Computer Science Humboldt Universität Berlin November 27, 2007 1 / 25 ... taken from http://mynetworkvalue.com/

More information

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT

More information

Database Marketing, Business Intelligence and Knowledge Discovery

Database Marketing, Business Intelligence and Knowledge Discovery Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski

More information

Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset

Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cosine Similarity

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

Analyzing Huge Data Sets in Forensic Investigations

Analyzing Huge Data Sets in Forensic Investigations Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre

More information

Chapter ML:XI. XI. Cluster Analysis

Chapter ML:XI. XI. Cluster Analysis Chapter ML:XI XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster

More information

Data Warehousing and Data Mining in Business Applications

Data Warehousing and Data Mining in Business Applications 133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business

More information

Data, Measurements, Features

Data, Measurements, Features Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are

More information

A Survey on Web Mining From Web Server Log

A Survey on Web Mining From Web Server Log A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

An example. Visualization? An example. Scientific Visualization. This talk. Information Visualization & Visual Analytics. 30 items, 30 x 3 values

An example. Visualization? An example. Scientific Visualization. This talk. Information Visualization & Visual Analytics. 30 items, 30 x 3 values Information Visualization & Visual Analytics Jack van Wijk Technische Universiteit Eindhoven An example y 30 items, 30 x 3 values I-science for Astronomy, October 13-17, 2008 Lorentz center, Leiden x An

More information

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

Tracking System for GPS Devices and Mining of Spatial Data

Tracking System for GPS Devices and Mining of Spatial Data Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja

More information

Customer Analytics. Turn Big Data into Big Value

Customer Analytics. Turn Big Data into Big Value Turn Big Data into Big Value All Your Data Integrated in Just One Place BIRT Analytics lets you capture the value of Big Data that speeds right by most enterprises. It analyzes massive volumes of data

More information

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support Rok Rupnik, Matjaž Kukar, Marko Bajec, Marjan Krisper University of Ljubljana, Faculty of Computer and Information

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Working with telecommunications

Working with telecommunications Working with telecommunications Minimizing churn in the telecommunications industry Contents: 1 Churn analysis using data mining 2 Customer churn analysis with IBM SPSS Modeler 3 Types of analysis 3 Feature

More information

Discovery of User Groups within Mobile Data

Discovery of User Groups within Mobile Data Discovery of User Groups within Mobile Data Syed Agha Muhammad Technical University Darmstadt muhammad@ess.tu-darmstadt.de Kristof Van Laerhoven Darmstadt, Germany kristof@ess.tu-darmstadt.de ABSTRACT

More information

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing

More information

Insider Threat Detection Using Graph-Based Approaches

Insider Threat Detection Using Graph-Based Approaches Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence

More information

Data Mining in Telecommunication

Data Mining in Telecommunication Data Mining in Telecommunication Mohsin Nadaf & Vidya Kadam Department of IT, Trinity College of Engineering & Research, Pune, India E-mail : mohsinanadaf@gmail.com Abstract Telecommunication is one of

More information

Full-text Search in Intermediate Data Storage of FCART

Full-text Search in Intermediate Data Storage of FCART Full-text Search in Intermediate Data Storage of FCART Alexey Neznanov, Andrey Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia ANeznanov@hse.ru,

More information

MANAGING THE REVENUE CYCLE WITH BUSINESS INTELLIGENCE: June 30, 2006 BUSINESS INTELLIGENCE FOR HEALTHCARE

MANAGING THE REVENUE CYCLE WITH BUSINESS INTELLIGENCE: June 30, 2006 BUSINESS INTELLIGENCE FOR HEALTHCARE MANAGING THE REVENUE CYCLE WITH BUSINESS INTELLIGENCE: June 30, 2006 BUSINESS INTELLIGENCE FOR HEALTHCARE Hospital manager and leadership positions face many challenges in today s healthcare environment

More information

DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES

DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES Monica C. Holmes, Central Michigan University, holme1mc@cmich.edu Diane D. Comstock-Davidson, Central Michigan University, comst1dd@cmich.edu

More information

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University

More information

COURSE RECOMMENDER SYSTEM IN E-LEARNING

COURSE RECOMMENDER SYSTEM IN E-LEARNING International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand

More information

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended. Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives

More information

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University 590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran

More information

Information Visualization WS 2013/14 11 Visual Analytics

Information Visualization WS 2013/14 11 Visual Analytics 1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and

More information

Data Mining System, Functionalities and Applications: A Radical Review

Data Mining System, Functionalities and Applications: A Radical Review Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially

More information

Principal MDM Components and Capabilities

Principal MDM Components and Capabilities Principal MDM Components and Capabilities David Loshin Knowledge Integrity, Inc. 1 Agenda Introduction to master data management The MDM Component Layer Model MDM Maturity MDM Functional Services Summary

More information

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for

More information

A Risk Assessment Methodology (RAM) for Physical Security

A Risk Assessment Methodology (RAM) for Physical Security A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to

More information

Community Mining from Multi-relational Networks

Community Mining from Multi-relational Networks Community Mining from Multi-relational Networks Deng Cai 1, Zheng Shao 1, Xiaofei He 2, Xifeng Yan 1, and Jiawei Han 1 1 Computer Science Department, University of Illinois at Urbana Champaign (dengcai2,

More information

MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

More information

Multi-agent System for Web Advertising

Multi-agent System for Web Advertising Multi-agent System for Web Advertising Przemysław Kazienko 1 1 Wrocław University of Technology, Institute of Applied Informatics, Wybrzee S. Wyspiaskiego 27, 50-370 Wrocław, Poland kazienko@pwr.wroc.pl

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

INFO 1400. Koffka Khan. Tutorial 6

INFO 1400. Koffka Khan. Tutorial 6 INFO 1400 Koffka Khan Tutorial 6 Running Case Assignment: Improving Decision Making: Redesigning the Customer Database Dirt Bikes U.S.A. sells primarily through its distributors. It maintains a small customer

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Forward Thinking for Tomorrow s Projects Requirements for Business Analytics

Forward Thinking for Tomorrow s Projects Requirements for Business Analytics Seilevel Whitepaper Forward Thinking for Tomorrow s Projects Requirements for Business Analytics By: Joy Beatty, VP of Research & Development & Karl Wiegers, Founder Process Impact We are seeing a change

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers 60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative

More information