A Tool for Analysis and Visualization of Criminal Networks
|
|
|
- Brice Williamson
- 9 years ago
- Views:
Transcription
1 th UKSIM-AMSS International Conference on Modelling and Simulation A Tool for Analysis and Visualization of Criminal Networks Amer Rasheed The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Odense, Denmark [email protected] Abstract Analyzing complexities in criminal networks is a complex issue. They become even worse when there is involvement of external collaborative networks. Criminal nodes in different criminal sub-groups combine together to form a big network. It is difficult to explore criminal activity that is building up among the sub-groups. Data from the initial investigations reveal only partial information. Hence, there is a need to find links between the data for getting adequate information. We have introduced novel visualization features that can help trace the collaborations of the individual criminal nodes with other nodes and detect the patterns of hidden criminal activities in the sub-clusters. The current study demonstrates our proposed visualization tool by using a case study of the Chicago narcotics datasets. The PEVNET tool can support crime analysts in analyzing the intra-network criminal activities. Our novel features will not only help the crime analysts in building a rationale but also in strengthening their viewpoints using PEVNET. Keywords-information visualization; investigative analysis; clustering; sub-cluster; criminal patterns I. INTRODUCTION Criminal networks are complex networks and are based on the acts of the offenders that are in the networks [1]. Knowledge of criminal networks is vital for developing techniques to combat probable criminal attacks [2]. There has been a profound discussion over the core structure, the relationships, and the infrastructure of criminal networks. The offenders try to hide their collaborative actions to conceal relationships. Pieces of collaborative information [1, 3] are combined to perform an investigative analysis (IA) [2]. With the aid of comprehensive IA, the concealed information can be disclosed. There has been a big shift in performing a manual analysis to visualize the datasets. In this regard, there are some visualization tools [1, 4] that have been introduced. The crime analysts usually intend to perform their analysis by visualization of the criminal networks. There are a number of reasons behind the intentions of these crime analysts. Some of these reasons include the simple, easy to use, and understandable interface provided by the visualization tools since interactivity plays a brilliant role in making visualization more understandable. Due to the above reasons, the crime analysts require advanced tools in order to perform their investigations. Uffe Kock Wiil The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Odense, Denmark [email protected] We have focused on certain aspects of the criminal network analysis and have found certain issues. We believe that by fixing those issues and providing the analysts with a more analytical interface, support for decision making can be enhanced to a large extent. Social network analysis (SNA) describes the relationship between the interacting units, so called criminal nodes in our case [5]. By mapping these relationships, the analyst can reveal the hidden interactions or patterns in their relations. The activities in these relationships are required to be traced over some regular intervals of time. Sometimes, there is a sequence in these activities that links these relationships. It is often the case that this linkage of activities gives a strong clue of involvement of certain nodes in some criminal activities. While undergoing the current literature review, we found a few visualization tools that really help crime analysts but none of those give a complete decision support in approaching the desired target. They have to employ certain external tools and techniques to perform a comprehensive analysis. In this paper, we examine PEVNET [6] as an IA tool by demonstrating its utilization with the perspective of visualization. We have provide a case study of how the analysts may benefit from our tool and how it can become a productive tool in IA. This is done through a comprehensive tool demonstration, which is the core motive of this paper. II. RELATED WORK We have found plenty of network visualization tools by examining the existing literature. Information seeking mantra by Schneiderman [7] is an efficient visualization technique. The tree map algorithm by Shneiderman [8] defines an algorithm for mapping a social network on a tree structure. CrimeNet [4] displays data by showing the relations as thick links in case there are strong relationships. COPLINK [9] was introduced by Chen and Byron to integrate knowledge management with IA. KeyPathwayMiner [10] proposed by Josch et al. uses the boolean matrix technique for optimizing a visual query. The CrimeFighter, a tool for counterterrorism [11], contains the CrimeFighter Investigator (CFI) [12]. CFI also contains visualization features for instance: re-structuring, drag and /15 $ Crown Copyright DOI /UKSim
2 Figure 1. Clustering using proposed novel clustering algorithm require selection of Crime Type from the list of values on the PEVNET desktop. drop, etc. CrimeFighter Explorer and Crime Fighter Assistant [13] are also other worth-quoting visualization tools. Generally, the analyst s job is putting together the pieces of information [3] by different ways; for instance, whiteboard analysis, compartmentalization [1], etc. Compartmentalization is the reduction of information and modification of information as it passes through different investigation channels, so called compartments. There are a number of IA tools available, such as sandbox analysis [13], but none of them perform a comparative study of the available systems. Moreover, there are different visualization features in the exiting tools but those features are scattered all over the various tools. Many tools support one or more aspects of IA and leave out other aspects in one way or another. Hence, we have found multiple tools that are not up to the mark in one way or another. For instance, it works well when we want to visualize network datasets in Gephi but when there is a need for the filtration of the datasets, then Gephi is not a handy tool. Keeping in consideration our findings, we have developed PEVNET [6]. PEVNET is actually a transformation of crime investigation from the traditional Link Analysis, on whiteboard, to dynamic visualization. The analyst is provided with advanced drag and drop facilities. PEVNET simplifies some of the crime investigation procedures by providing the details on demand [15] facility on the interface as shown by criminal record window in the Fig. 1. Figure 2. On selecting the crime type Hallucinogens, the sub-clusters with the selected crime types are displayed. On close observation, the original criminal network is also evident in the background. 98
3 Figure 3. Visualizing Similar Node feature is being shown on PEVNET desktop. Heroin (white) is shown with pink color legend on top right corner of the desktop. Similarly, the node of Heroin (white) is shown in the map of Chicago city inside the Location window. III. VISUALIZATION FEATURES PEVNET has several features, for instance, similar node feature, clustering of sub-groups, detecting collaborating sub-cluster feature, trend analysis feature etc. that provide a sound platform to the crime analysts. With the support of the PEVNET tool, the analysts can have effective decision making and they can perform their analysis easily as compared to other existing tools. Temporal visualization features and the clustering algorithm constitute a vital part of the PEVNET tool. The analyst can be able to differentiate among sub-clusters, which are difficult to perform unlike with statistical techniques. There are some features which are novel in PEVNET. But, some existing features are reexamined [15] in a unique way to enhance the interactivity. The features in PEVNET are as follows: A. Network Visualization Features The network visualization features in PEVNET address the issues related to drag and drop, details on demand, and focusing. It is easier to compare different parameters while formulating any opinion. 1) Node-link color feature: The feature helps network analysts in grouping data for visual analysis because with this feature, the colors of the nodes become thicker with the increase in the weights of the nodes. Thus the analyst can group nodes carrying different weights. 2) Locating central persons: Locating central persons is crucial for determining the structure of the criminal networks. The analysts can locate a subcluster easily since the clusters usually have one master mind. Locating and eliminating that person results in the maximum crack down of the network. One of the prime motives of the Anacapa chart [16] is to find the central person in the network. 3) Node-Link size feature: The size of the nodes increase with the increase in their weight. The weight of the node is the depiction of the crime involvement of that node. With the help of the node-link size feature, the analysts can demarcate between high weighted nodes and light weighted nodes. It is nearly the same feature as the color feature discussed above since both are affected by the increase in the weight of the node. The analysts sometimes carry out more analytical results with the node-link size feature as compared to the nodelink color feature. 4) Node-link details on demand feature: The details on demand feature display the attribute information of the respective node or link which is accessed. When the nodes or links are selected, their relevant attributes are displayed in the criminal record windows. The attributes for instance; list of the crime, general information, image, criminal information with respect to co-offending crimes using a pie-chart, and group information 5) Network of clusters: With our proposed clustering algorithm [6], the analysts can visualize clusters of different crime types. We have proposed a unique clustering algorithm [15]. The algorithm is implemented in such a way that the selected cluster becomes distinct or visible as compared to the other objects of the network. The members of the clusters can be seen over the whole network like a unique layer. Visual filtering, by way of clustering, enhances the visibility of the data as compared to the statistical tabular data. 6) Detecting collaborating sub-cluster feature: The details of the feature are in the section 1V. B. Visualization Features Based On Temporal Data Below are the visualization features that are based on some temporal activity in the criminal networks. 99
4 1) Trend Analysis feature: With the trend analysis feature, the analysts can have an idea of how the different volumes or sizes of the clusters evolve over time. The authorities can take effective measures based on the trends provided by this feature. This feature has not been implemented yet. It will be implemented as part of the future work. 2) Encircle feature: With this feature, the analysts can recognize the respective cluster so that it is not mixed up with other clusters. C. Composite Features The composite features are the visualization features that are used to understand the semantics of the data sets by contracting and expanding the information under consideration. In this way, the analysts can develop a good understanding of the data. In PEVNET, we have proposed the following composite features: 1) Expand collapse feature: The expand collapse feature pertains to the composites, i.e., how the information of the groups of nodes collapse and expand. 2) Visualizing similar node feature: The visualizing similar node feature gathers the nodes in the networks that are involved in the same types of crime. The reported events of the criminal activities fall in different geographical locations and thus crime collaboration, if any, between the criminal nodes can be tracked with the aid of this unique and novel feature. Out of the thirteen above visualization features, nine have been implemented so far. IV. TOOL OVERVIEW In the PEVNET interface, there is a layout as shown in Fig. 1. The layout is usually comprised of a node and link diagram, depicting the network visualization. Two clusters are shown in Fig. 2. Chloe and William are shown as master minds or the central persons in their respective clusters. We have used a simple data set so that the readers can easily understand the functionality of the tool. Besides the PEVNET layout, several menu items in the desktop are shown. In this menu item, there is a date filter menu item is shown in Fig. 5. The nodes with the selected crime types are clustered in such a way that the cluster seems to pop up from the original network snapshot as shown in Fig. 2 [6]. The analyst can shuffle the date calendar and can easily monitor the criminal activity over time. The next menu item is the crime type filter list item, showing different crime types. In the list item, the crime type numbers, called the IUCR or Illinois Uniform Crime Reporting, and their respective color legends are shown on the left and the right hand sides of the crime types, respectively. For the user s convenience, the color legend list with the same design is displayed on the right hand side as the legend list menu item. One can also find the map showing the geographical locations of the crime sights in Fig. 3. The trend analysis feature [6] as shown in Fig. 4, is used to detect variations in criminal activity over some span of time, for instance the reported crimes of the whole year It helps the analyst in the prediction of certain criminal activity. For instance, the variation of various crime types is shown by IUCR number of the respective crime types in Fig. 4. The first column shows the month titles while the first row shows the titles of crime types along with the respective IUCRs. For instance, the first column shows the decrease in the activity of the crime type Hallucinogens during the months of September, October, November, and December in the years The yellow color of the small circles corresponds to the respective legend colors, shown in the top right menu. The information about the names of the crime types can be found from the crime type filter menu item. So, all the features of PEVNET complement each other in one way or another to facilitate the analysts. We use random positioning techniques in the PEVNET layout. Due to which, the nodes are seen randomly on the graph layout. The nodes are geographically distributed with respect to the crime locations as provided in the datasets of the example as shown in Fig. 3, i.e., the similar nodes feature [15]. A crime location is comprised of longitude and latitude in the crime report. A display structure is used to represent a node in the graphical user interface (GUI). This display structure is primarily based on a circle, in the case of nodes, but with extended features. With the extended features, the demarcation between the different sub-groups has been shown in some of the PEVNET features; for instance, the collaborating sub-cluster feature. In PEVNET, the detection of similar crime is of vital importance. Occasionally, it is needed during crime investigation. The analyst is required to search persons (nodes) that are dealing with some crime types. He will select any node that is involved in for instance Heroin in the network by watching the legend panel. The system will automatically make those nodes appear prominently which are linked with Heroin crime type as shown in the location window in the Fig. 3. In our previous work [15], our proposed visualizing similar node feature has been shown in Fig. 2. With the visualizing similar node feature, the analyst can study the nodes, which 100
5 Figure 4. Different crime types are shown with the perspective of Trend analysis feature. have the same types of crime but are located at some distance apart in some other geographical locations. A. Case Study We use a case study based on the data from the Chicago narcotics datasets used by the Chicago Police Department (CPD) to demonstrate the framework. It is available in excel file format. The format in Microsoft Excel is more understandable to the majority of users. The format helped us a lot during the system evaluation since the users could validate their findings by comparing their results from the excel sheet. B. Detecting Collaborating Sub-Clusters Feature It is difficult to find information about the sub-clusters which is hidden from the naked eye of the analyst while he is performing the analysis. There is a need for advanced techniques to navigate through the networks. Sometimes, the networks need to be inverted in some dimension in such a way that the information is revealed. In some cases, the external references, i.e., the links outside the networks, act as a vital source of information. In many of the cases, the external links are sometimes the master minds of the crimes. In PEVNET, there is a provision of a detecting collaborating sub-cluster feature, with the help of which the information is shown by selecting the crime type information from the menu and the nodes colors. The analyst can detect sub-clusters inside the network upon finding the information about certain crime types. The information is revealed if any node has got more than one colors. Since there is chance for the possible involvement of the suspects in some other co-offending crimes; such information may be disclosed upon interrogation of the suspect. It is a vital part of IA. The proposed detecting collaborating sub-cluster feature addresses this issue and extracts the hidden crimes about the co-offending criminal networks. PEVNET displays the relevant information of the collaborating crimes with the help of a variety of color combinations. Each crime type is depicted with different crime legends as shown in Fig. 5. The detecting collaborating sub-cluster feature can be understood by examining Figs. 1 and 2. In Fig. 1, the node William is shown to have been involved in Cannabis 30 gms. or less, a crime with the code 1811 and Hallucinogens The other collaborating nodes are Madison, Olivia, and Alexander. By watching the information of the node Williams from the legend information on the PEVNET desktop, it can be seen that Williams has been involved in Cannabis 30 gms. or less, a crime with the code 1811 and Hallucinogens (2025). Since 1811 and 2025 crime types are shown by bright green and dull green colors in the legend information and William is also shown to have been involved in same colors in Fig.1. So we can easily infer that William is detected to have been in 1811 and 2025 crime types. We can find the effectiveness of the detecting collaborating sub-cluster feature by making the filtration of the information. For instance, a node Chloe was involved in three crime types, i.e., Cannabis 30 gms. or less 1811, Heroin (white) denoted as 2024 and Hallucinogens 2025 as shown in Fig.1. The filtered information has revealed the information about Chloe in the case of Hallucinogens. The other collaborating nodes are Emily and Daniel as shown in Fig. 2. Also, the information of the node Chloe from the pie-chart information can be found. We take another example of detecting collaborating sub-cluster feature. Chloe is shown to have been involved in Heroin and Hallucinogens as shown by two legend colors in Fig. 5. The collaboration or involvement of Chloe with other nodes Ethan, Michael, Mia, Noah, and Jayden in the crime of Heroin is shown clearly. There were overheads of both the analyst s precious time and computation in getting such information in the past. It can now be retrieved easily by using the detecting collaborating sub-cluster feature. V. CONCLUSION This paper is a tool demonstration paper and it has demonstrated a criminal network visualization tool. With a variety of network visualization and clustering features along with features based on temporal datasets, the crime analysts is provided with enhanced support for decision making. With the use of the proposed features, criminal network analysis will become more productive as the analysts is expected to get more time to concentrate on 101
6 Figure 5. A person Chloe is shown to have been involved in collaboration with respect to the Heroin (white) crime type. subsequent issues rather than having to deal with the complexities and detail as in the past. REFERENCES [1] R. R. Petersen. "Criminal Network Investigation: Processes, Tools, and Techniques". Diss. SDUSDU, Det Tekniske FakultetFaculty of Engineering, Mærsk Mc-Kinney Møller Instituttet, [2] H. Ebel, J. Davidsen, and S. Bornholdt. "Dynamics of social networks." Complexity 8, no. 2 (2002): Analysis and visualization of criminal networks. [3] J. S. Yi, Youn ah Kang, J. T. Stasko, and J. A. Jacko "Toward a deeper understanding of the role of interaction in information visualization. Visualization and Computer Graphics, IEEE Transactions on 13.6 : [4] J. J. Xu and H. Chen, CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery University of Arizona, ACM Transactions on Information Systems (TOIS), Volume 23 Issue 2, April 2005, Pages , [5] K. Ehrlich and I. Carboni, Inside Social Network Analysis, [6] A. Rasheed, and U. K. Wiil, 2014 The 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014). IEEE Computer Society Press, s s. [7] S. K. Card, J. D. Mackinlay, and B. Schneiderman, "Readings in information visualization: using vision to think". Morgan Kaufmann Publishers, [8] B. Shneiderman, "The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations", [9] J. Schroeder, COPLINK: Database Integration and Access for a Law Enforcement Intranet, National Criminal Justice Reference Service (NCJRS), [10] P. Josch, N. Alcaraz, A. Junge, and J. Baumbach, "KeyPathwayMiner 4.0: Condition-specific pathway analysis by combining multiple OMICs studies and networks", [11] U. K. Wiil, N. Memon, and J. Gniadek, Crimefighter: A toolbox for counterterrorism, in Knowledge Discovery, Knowlege Engineering and Knowledge Management, ser. Communications in Computer and Information Science, A. Fred, J. L. G. Dietz, K. Liu, and J. Filipe, Eds.Springer Berlin Heidelberg, 2011, vol. 128, pp , [12] R. R. Petersen and U. K. Wiil. Crimefighter investigator: A novel tool for criminal network investigation, European Intelligence and Security Informatics Conference (EISIC), sept. 2011, pp , [13] U. K. Wiil, J. Gniadek, and N. Memon, Crimefighter assitant: A knowledge managment tool for terrorist network analysis, in International Conference on Knowledge Management and Information Sharing (KMIS 2010). INSTICC Press, 2010, pp , [14] W. Wright, D. Schroh, P. Proulx, A. Skaburskis, and B. Cort, The sandbox for analysis: Concepts and methods, in ACM CHI, April 2006, pp [15] A. Rasheed and U.K. Wiil, Novel Visualization Features of Temporal Data Using PEVNET, Multidisciplinary Social Networks Research: International Conference, MISNC Springer, s s [16] D. H. Harris, Human Factors and Ergonomics Society. Article in a journal: [17] A. Rasheed and Uffe Kock Wiil, Novel Analysis and Visualization Features in PEVNET, The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Campusvej 55, 5230 Odense M, Denmark. Submitted for acceptance, unpublished. 102
CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil
CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes,
Interactive Information Visualization of Trend Information
Interactive Information Visualization of Trend Information Yasufumi Takama Takashi Yamada Tokyo Metropolitan University 6-6 Asahigaoka, Hino, Tokyo 191-0065, Japan [email protected] Abstract This paper
Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004
Data Visualization Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Contents Brief Overview of ArcMap Goals of the Exercise Computer
TIBCO Spotfire Business Author Essentials Quick Reference Guide. Table of contents:
Table of contents: Access Data for Analysis Data file types Format assumptions Data from Excel Information links Add multiple data tables Create & Interpret Visualizations Table Pie Chart Cross Table Treemap
Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
QUALITY TOOLBOX. Understanding Processes with Hierarchical Process Mapping. Robert B. Pojasek. Why Process Mapping?
QUALITY TOOLBOX Understanding Processes with Hierarchical Process Mapping In my work, I spend a lot of time talking to people about hierarchical process mapping. It strikes me as funny that whenever I
Creating a Tableau Data Visualization on Cincinnati Crime By Jeffrey A. Shaffer
Creating a Tableau Data Visualization on Cincinnati Crime By Jeffrey A. Shaffer Step 1 Gather and Compile the Data: This data was compiled using weekly files provided by the Cincinnati Police. Each file
White Paper April 2006
White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5
Interactive information visualization in a conference location
Interactive information visualization in a conference location Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni Istituto di Ricerche sulla Popolazione e Politiche Sociali, CNR, Via Nizza 128, 00198
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration
An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration Toktam Taghavi, Andy D. Pimentel Computer Systems Architecture Group, Informatics Institute
Dynamic Visualization and Time
Dynamic Visualization and Time Markku Reunanen, [email protected] Introduction Edward Tufte (1997, 23) asked five questions on a visualization in his book Visual Explanations: How many? How often? Where? How
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations. Ben Shneiderman, 1996
The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations Ben Shneiderman, 1996 Background the growth of computing + graphic user interface 1987 scientific visualization 1989 information
NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES
43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes
A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Visual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features
Graphical Web based Tool for Generating Query from Star Schema
Graphical Web based Tool for Generating Query from Star Schema Mohammed Anbar a, Ku Ruhana Ku-Mahamud b a College of Arts and Sciences Universiti Utara Malaysia, 0600 Sintok, Kedah, Malaysia Tel: 604-2449604
Intermediate PowerPoint
Intermediate PowerPoint Charts and Templates By: Jim Waddell Last modified: January 2002 Topics to be covered: Creating Charts 2 Creating the chart. 2 Line Charts and Scatter Plots 4 Making a Line Chart.
MARS STUDENT IMAGING PROJECT
MARS STUDENT IMAGING PROJECT Data Analysis Practice Guide Mars Education Program Arizona State University Data Analysis Practice Guide This set of activities is designed to help you organize data you collect
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University
Visualization of Phylogenetic Trees and Metadata
Visualization of Phylogenetic Trees and Metadata November 27, 2015 Sample to Insight CLC bio, a QIAGEN Company Silkeborgvej 2 Prismet 8000 Aarhus C Denmark Telephone: +45 70 22 32 44 www.clcbio.com [email protected]
Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics
Paper 3323-2015 Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics ABSTRACT Stephen Overton, Ben Zenick, Zencos Consulting Network diagrams in SAS
Data Mining for Digital Forensics
Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected
Visualizing the Top 400 Universities
Int'l Conf. e-learning, e-bus., EIS, and e-gov. EEE'15 81 Visualizing the Top 400 Universities Salwa Aljehane 1, Reem Alshahrani 1, and Maha Thafar 1 [email protected], [email protected], [email protected]
TIBCO Spotfire Network Analytics 1.1. User s Manual
TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Excel -- Creating Charts
Excel -- Creating Charts The saying goes, A picture is worth a thousand words, and so true. Professional looking charts give visual enhancement to your statistics, fiscal reports or presentation. Excel
Sign Inventory and Management (SIM) Program Introduction
Sign Inventory and Management (SIM) Program Introduction A Sign Inventory and Management (SIM) Program is an area of asset management that focuses specifically on creating an inventory of traffic signs
Create a Poster Using Publisher
Contents 1. Introduction 1. Starting Publisher 2. Create a Poster Template 5. Aligning your images and text 7. Apply a background 12. Add text to your poster 14. Add pictures to your poster 17. Add graphs
Introduction to ArcView 3.2a
Introduction to ArcView 3.2a Training Center U.S. Geological Survey Center for Earth Resources Observation and Science (EROS) Sioux Falls, South Dakota, USA Introduction to ArcView 3.2a Introduction to
The Value of Visualization for Understanding Data and Making Decisions
September 24, 2014 The Value of Visualization for Understanding Data and Making Decisions John Stasko School of Interactive Computing Georgia Institute of Technology [email protected] JISIC 2014 Data
Tracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
A Statistical Text Mining Method for Patent Analysis
A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, [email protected] Abstract Most text data from diverse document databases are unsuitable for analytical
Data Warehouse Snowflake Design and Performance Considerations in Business Analytics
Journal of Advances in Information Technology Vol. 6, No. 4, November 2015 Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Jiangping Wang and Janet L. Kourik Walker
Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas
Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas Applies to: SAP NetWeaver BW. Summary This document is the second installment of a 6 part Query Designer Training guide for
GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL CLUSTERING
Geoinformatics 2004 Proc. 12th Int. Conf. on Geoinformatics Geospatial Information Research: Bridging the Pacific and Atlantic University of Gävle, Sweden, 7-9 June 2004 GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL
Formulas, Functions and Charts
Formulas, Functions and Charts :: 167 8 Formulas, Functions and Charts 8.1 INTRODUCTION In this leson you can enter formula and functions and perform mathematical calcualtions. You will also be able to
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Big Data: Rethinking Text Visualization
Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important
Data Visualization. Brief Overview of ArcMap
Data Visualization Prepared by Francisco Olivera, Ph.D., P.E., Srikanth Koka and Lauren Walker Department of Civil Engineering September 13, 2006 Contents: Brief Overview of ArcMap Goals of the Exercise
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
Data representation and analysis in Excel
Page 1 Data representation and analysis in Excel Let s Get Started! This course will teach you how to analyze data and make charts in Excel so that the data may be represented in a visual way that reflects
A Guide for Writing a Technical Research Paper
A Guide for Writing a Technical Research Paper Libby Shoop Macalester College, Mathematics and Computer Science Department 1 Introduction This document provides you with some tips and some resources to
an introduction to VISUALIZING DATA by joel laumans
an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA iii AN INTRODUCTION TO VISUALIZING DATA by Joel Laumans Table of Contents 1 Introduction 1 Definition Purpose 2 Data
Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results
, pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department
Handling the Complexity of RDF Data: Combining List and Graph Visualization
Handling the Complexity of RDF Data: Combining List and Graph Visualization Philipp Heim and Jürgen Ziegler (University of Duisburg-Essen, Germany philipp.heim, [email protected]) Abstract: An
Scatter Plots with Error Bars
Chapter 165 Scatter Plots with Error Bars Introduction The procedure extends the capability of the basic scatter plot by allowing you to plot the variability in Y and X corresponding to each point. Each
TEXT-FILLED STACKED AREA GRAPHS Martin Kraus
Martin Kraus Text can add a significant amount of detail and value to an information visualization. In particular, it can integrate more of the data that a visualization is based on, and it can also integrate
Pure1 Manage User Guide
User Guide 11/2015 Contents Overview... 2 Pure1 Manage Navigation... 3 Pure1 Manage - Arrays Page... 5 Card View... 5 Expanded Card View... 7 List View... 10 Pure1 Manage Replication Page... 11 Pure1
Copyright EPiServer AB
Table of Contents 3 Table of Contents ABOUT THIS DOCUMENTATION 4 HOW TO ACCESS EPISERVER HELP SYSTEM 4 EXPECTED KNOWLEDGE 4 ONLINE COMMUNITY ON EPISERVER WORLD 4 COPYRIGHT NOTICE 4 EPISERVER ONLINECENTER
Remote Usability Evaluation of Mobile Web Applications
Remote Usability Evaluation of Mobile Web Applications Paolo Burzacca and Fabio Paternò CNR-ISTI, HIIS Laboratory, via G. Moruzzi 1, 56124 Pisa, Italy {paolo.burzacca,fabio.paterno}@isti.cnr.it Abstract.
As noted in previous chapters, crime analysis relies heavily on computer
07-Boba-4723.qxd 6/9/2005 3:43 PM Page 101 7 Crime Analysis Technology As noted in previous chapters, crime analysis relies heavily on computer technology, and over the past 15 years significant improvements
Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator
Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator Victoria L. Lemieux 1,2, Benjamin W.K. Shieh 2, David
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
Crime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Latin American and Caribbean Flood and Drought Monitor Tutorial Last Updated: November 2014
Latin American and Caribbean Flood and Drought Monitor Tutorial Last Updated: November 2014 Introduction: This tutorial examines the main features of the Latin American and Caribbean Flood and Drought
Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers
60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
Making Critical Connections: Predictive Analytics in Government
Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.
A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered
ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS
DATABASE MARKETING Fall 2015, max 24 credits Dead line 15.10. ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS PART A Gains chart with excel Prepare a gains chart from the data in \\work\courses\e\27\e20100\ass4b.xls.
Security visualisation
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco
Purdue University Writing Lab Indiana Department of Transportation Workshop Series Dr. David Blakesley, Allen Brizee
Designing Research Posters This handout explains how to use effective design strategies to compose research posters. Research Posters Catch Reader s Attention and Make Key Information Understandable Research
Designing a Graphical User Interface
Designing a Graphical User Interface 1 Designing a Graphical User Interface James Hunter Michigan State University ECE 480 Design Team 6 5 April 2013 Summary The purpose of this application note is to
NakeDB: Database Schema Visualization
NAKEDB: DATABASE SCHEMA VISUALIZATION, APRIL 2008 1 NakeDB: Database Schema Visualization Luis Miguel Cortés-Peña, Yi Han, Neil Pradhan, Romain Rigaux Abstract Current database schema visualization tools
Getting Started with GRUFF
Getting Started with GRUFF Introduction Most articles in this book focus on interesting applications of Linked Open Data (LOD). But this chapter describes some simple steps on how to use a triple store,
MicroStrategy Desktop
MicroStrategy Desktop Quick Start Guide MicroStrategy Desktop is designed to enable business professionals like you to explore data, simply and without needing direct support from IT. 1 Import data from
OECD.Stat Web Browser User Guide
OECD.Stat Web Browser User Guide May 2013 May 2013 1 p.10 Search by keyword across themes and datasets p.31 View and save combined queries p.11 Customise dimensions: select variables, change table layout;
About PivotTable reports
Page 1 of 8 Excel Home > PivotTable reports and PivotChart reports > Basics Overview of PivotTable and PivotChart reports Show All Use a PivotTable report to summarize, analyze, explore, and present summary
<no narration for this slide>
1 2 The standard narration text is : After completing this lesson, you will be able to: < > SAP Visual Intelligence is our latest innovation
Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients
Technical Paper Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients A practical introduction to SAS Information Map Studio and SAS Web Report Studio for new and experienced
The US Bridge Portal -Visualization Analytics Applications for the National Bridge Inventory (NBI) Database
The US Bridge Portal -Visualization Analytics Applications for the National Bridge Inventory (NBI) Database Matija Radovic #1, Dr. Offei Adarkwa #2 1 Civil and Environmental Engineering Department, University
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Analytics with Excel and ARQUERY for Oracle OLAP
Analytics with Excel and ARQUERY for Oracle OLAP Data analytics gives you a powerful advantage in the business industry. Companies use expensive and complex Business Intelligence tools to analyze their
Creating Accessible Word Documents
Center for Faculty Development and Support Creating Accessible Word Documents With Microsoft Word 2008 for Macintosh CREATING ACCESSIBLE WORD DOCUMENTS 3 Overview 3 Learning Objectives 3 Prerequisites
A Tutorial on dynamic networks. By Clement Levallois, Erasmus University Rotterdam
A Tutorial on dynamic networks By, Erasmus University Rotterdam V 1.0-2013 Bio notes Education in economics, management, history of science (Ph.D.) Since 2008, turned to digital methods for research. data
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Data Doesn t Communicate Itself Using Visualization to Tell Better Stories
SAP Brief Analytics SAP Lumira Objectives Data Doesn t Communicate Itself Using Visualization to Tell Better Stories Tap into your data big and small Tap into your data big and small In today s fast-paced
Step 2: Learn where the nearest divergent boundaries are located.
What happens when plates diverge? Plates spread apart, or diverge, from each other at divergent boundaries. At these boundaries new ocean crust is added to the Earth s surface and ocean basins are created.
Topic Maps Visualization
Topic Maps Visualization Bénédicte Le Grand, Laboratoire d'informatique de Paris 6 Introduction Topic maps provide a bridge between the domains of knowledge representation and information management. Topics
TOP New Features of Oracle Business Intelligence 11g
10 TOP New Features of Oracle Business Intelligence 11g TABLE OF CONTENTS Feature 1 New Chart Choices Funnel Chart 2 Trellis Chart 3 Waterfall 4 Tile Diagram 5 Feature 2 Recommended Visualization 6 Feature
Seeing by Degrees: Programming Visualization From Sensor Networks
Seeing by Degrees: Programming Visualization From Sensor Networks Da-Wei Huang Michael Bobker Daniel Harris Engineer, Building Manager, Building Director of Control Control Technology Strategy Development
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
Information Literacy Program
Information Literacy Program Excel (2013) Advanced Charts 2015 ANU Library anulib.anu.edu.au/training [email protected] Table of Contents Excel (2013) Advanced Charts Overview of charts... 1 Create a chart...
Bitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
Spotfire v6 New Features. TIBCO Spotfire Delta Training Jumpstart
Spotfire v6 New Features TIBCO Spotfire Delta Training Jumpstart Map charts New map chart Layers control Navigation control Interaction mode control Scale Web map Creating a map chart Layers are added
PURPOSE OF GRAPHS YOU ARE ABOUT TO BUILD. To explore for a relationship between the categories of two discrete variables
3 Stacked Bar Graph PURPOSE OF GRAPHS YOU ARE ABOUT TO BUILD To explore for a relationship between the categories of two discrete variables 3.1 Introduction to the Stacked Bar Graph «As with the simple
Lasse Cronqvist. Email: [email protected]. Tosmana. TOol for SMAll-N Analysis. version 1.2. User Manual
Lasse Cronqvist Email: [email protected] Tosmana TOol for SMAll-N Analysis version 1.2 User Manual Release: 24 th of January 2005 Content 1. Introduction... 3 2. Installing Tosmana... 4 Installing
