A Tool for Analysis and Visualization of Criminal Networks

Size: px
Start display at page:

Download "A Tool for Analysis and Visualization of Criminal Networks"

Transcription

1 th UKSIM-AMSS International Conference on Modelling and Simulation A Tool for Analysis and Visualization of Criminal Networks Amer Rasheed The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Odense, Denmark [email protected] Abstract Analyzing complexities in criminal networks is a complex issue. They become even worse when there is involvement of external collaborative networks. Criminal nodes in different criminal sub-groups combine together to form a big network. It is difficult to explore criminal activity that is building up among the sub-groups. Data from the initial investigations reveal only partial information. Hence, there is a need to find links between the data for getting adequate information. We have introduced novel visualization features that can help trace the collaborations of the individual criminal nodes with other nodes and detect the patterns of hidden criminal activities in the sub-clusters. The current study demonstrates our proposed visualization tool by using a case study of the Chicago narcotics datasets. The PEVNET tool can support crime analysts in analyzing the intra-network criminal activities. Our novel features will not only help the crime analysts in building a rationale but also in strengthening their viewpoints using PEVNET. Keywords-information visualization; investigative analysis; clustering; sub-cluster; criminal patterns I. INTRODUCTION Criminal networks are complex networks and are based on the acts of the offenders that are in the networks [1]. Knowledge of criminal networks is vital for developing techniques to combat probable criminal attacks [2]. There has been a profound discussion over the core structure, the relationships, and the infrastructure of criminal networks. The offenders try to hide their collaborative actions to conceal relationships. Pieces of collaborative information [1, 3] are combined to perform an investigative analysis (IA) [2]. With the aid of comprehensive IA, the concealed information can be disclosed. There has been a big shift in performing a manual analysis to visualize the datasets. In this regard, there are some visualization tools [1, 4] that have been introduced. The crime analysts usually intend to perform their analysis by visualization of the criminal networks. There are a number of reasons behind the intentions of these crime analysts. Some of these reasons include the simple, easy to use, and understandable interface provided by the visualization tools since interactivity plays a brilliant role in making visualization more understandable. Due to the above reasons, the crime analysts require advanced tools in order to perform their investigations. Uffe Kock Wiil The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Odense, Denmark [email protected] We have focused on certain aspects of the criminal network analysis and have found certain issues. We believe that by fixing those issues and providing the analysts with a more analytical interface, support for decision making can be enhanced to a large extent. Social network analysis (SNA) describes the relationship between the interacting units, so called criminal nodes in our case [5]. By mapping these relationships, the analyst can reveal the hidden interactions or patterns in their relations. The activities in these relationships are required to be traced over some regular intervals of time. Sometimes, there is a sequence in these activities that links these relationships. It is often the case that this linkage of activities gives a strong clue of involvement of certain nodes in some criminal activities. While undergoing the current literature review, we found a few visualization tools that really help crime analysts but none of those give a complete decision support in approaching the desired target. They have to employ certain external tools and techniques to perform a comprehensive analysis. In this paper, we examine PEVNET [6] as an IA tool by demonstrating its utilization with the perspective of visualization. We have provide a case study of how the analysts may benefit from our tool and how it can become a productive tool in IA. This is done through a comprehensive tool demonstration, which is the core motive of this paper. II. RELATED WORK We have found plenty of network visualization tools by examining the existing literature. Information seeking mantra by Schneiderman [7] is an efficient visualization technique. The tree map algorithm by Shneiderman [8] defines an algorithm for mapping a social network on a tree structure. CrimeNet [4] displays data by showing the relations as thick links in case there are strong relationships. COPLINK [9] was introduced by Chen and Byron to integrate knowledge management with IA. KeyPathwayMiner [10] proposed by Josch et al. uses the boolean matrix technique for optimizing a visual query. The CrimeFighter, a tool for counterterrorism [11], contains the CrimeFighter Investigator (CFI) [12]. CFI also contains visualization features for instance: re-structuring, drag and /15 $ Crown Copyright DOI /UKSim

2 Figure 1. Clustering using proposed novel clustering algorithm require selection of Crime Type from the list of values on the PEVNET desktop. drop, etc. CrimeFighter Explorer and Crime Fighter Assistant [13] are also other worth-quoting visualization tools. Generally, the analyst s job is putting together the pieces of information [3] by different ways; for instance, whiteboard analysis, compartmentalization [1], etc. Compartmentalization is the reduction of information and modification of information as it passes through different investigation channels, so called compartments. There are a number of IA tools available, such as sandbox analysis [13], but none of them perform a comparative study of the available systems. Moreover, there are different visualization features in the exiting tools but those features are scattered all over the various tools. Many tools support one or more aspects of IA and leave out other aspects in one way or another. Hence, we have found multiple tools that are not up to the mark in one way or another. For instance, it works well when we want to visualize network datasets in Gephi but when there is a need for the filtration of the datasets, then Gephi is not a handy tool. Keeping in consideration our findings, we have developed PEVNET [6]. PEVNET is actually a transformation of crime investigation from the traditional Link Analysis, on whiteboard, to dynamic visualization. The analyst is provided with advanced drag and drop facilities. PEVNET simplifies some of the crime investigation procedures by providing the details on demand [15] facility on the interface as shown by criminal record window in the Fig. 1. Figure 2. On selecting the crime type Hallucinogens, the sub-clusters with the selected crime types are displayed. On close observation, the original criminal network is also evident in the background. 98

3 Figure 3. Visualizing Similar Node feature is being shown on PEVNET desktop. Heroin (white) is shown with pink color legend on top right corner of the desktop. Similarly, the node of Heroin (white) is shown in the map of Chicago city inside the Location window. III. VISUALIZATION FEATURES PEVNET has several features, for instance, similar node feature, clustering of sub-groups, detecting collaborating sub-cluster feature, trend analysis feature etc. that provide a sound platform to the crime analysts. With the support of the PEVNET tool, the analysts can have effective decision making and they can perform their analysis easily as compared to other existing tools. Temporal visualization features and the clustering algorithm constitute a vital part of the PEVNET tool. The analyst can be able to differentiate among sub-clusters, which are difficult to perform unlike with statistical techniques. There are some features which are novel in PEVNET. But, some existing features are reexamined [15] in a unique way to enhance the interactivity. The features in PEVNET are as follows: A. Network Visualization Features The network visualization features in PEVNET address the issues related to drag and drop, details on demand, and focusing. It is easier to compare different parameters while formulating any opinion. 1) Node-link color feature: The feature helps network analysts in grouping data for visual analysis because with this feature, the colors of the nodes become thicker with the increase in the weights of the nodes. Thus the analyst can group nodes carrying different weights. 2) Locating central persons: Locating central persons is crucial for determining the structure of the criminal networks. The analysts can locate a subcluster easily since the clusters usually have one master mind. Locating and eliminating that person results in the maximum crack down of the network. One of the prime motives of the Anacapa chart [16] is to find the central person in the network. 3) Node-Link size feature: The size of the nodes increase with the increase in their weight. The weight of the node is the depiction of the crime involvement of that node. With the help of the node-link size feature, the analysts can demarcate between high weighted nodes and light weighted nodes. It is nearly the same feature as the color feature discussed above since both are affected by the increase in the weight of the node. The analysts sometimes carry out more analytical results with the node-link size feature as compared to the nodelink color feature. 4) Node-link details on demand feature: The details on demand feature display the attribute information of the respective node or link which is accessed. When the nodes or links are selected, their relevant attributes are displayed in the criminal record windows. The attributes for instance; list of the crime, general information, image, criminal information with respect to co-offending crimes using a pie-chart, and group information 5) Network of clusters: With our proposed clustering algorithm [6], the analysts can visualize clusters of different crime types. We have proposed a unique clustering algorithm [15]. The algorithm is implemented in such a way that the selected cluster becomes distinct or visible as compared to the other objects of the network. The members of the clusters can be seen over the whole network like a unique layer. Visual filtering, by way of clustering, enhances the visibility of the data as compared to the statistical tabular data. 6) Detecting collaborating sub-cluster feature: The details of the feature are in the section 1V. B. Visualization Features Based On Temporal Data Below are the visualization features that are based on some temporal activity in the criminal networks. 99

4 1) Trend Analysis feature: With the trend analysis feature, the analysts can have an idea of how the different volumes or sizes of the clusters evolve over time. The authorities can take effective measures based on the trends provided by this feature. This feature has not been implemented yet. It will be implemented as part of the future work. 2) Encircle feature: With this feature, the analysts can recognize the respective cluster so that it is not mixed up with other clusters. C. Composite Features The composite features are the visualization features that are used to understand the semantics of the data sets by contracting and expanding the information under consideration. In this way, the analysts can develop a good understanding of the data. In PEVNET, we have proposed the following composite features: 1) Expand collapse feature: The expand collapse feature pertains to the composites, i.e., how the information of the groups of nodes collapse and expand. 2) Visualizing similar node feature: The visualizing similar node feature gathers the nodes in the networks that are involved in the same types of crime. The reported events of the criminal activities fall in different geographical locations and thus crime collaboration, if any, between the criminal nodes can be tracked with the aid of this unique and novel feature. Out of the thirteen above visualization features, nine have been implemented so far. IV. TOOL OVERVIEW In the PEVNET interface, there is a layout as shown in Fig. 1. The layout is usually comprised of a node and link diagram, depicting the network visualization. Two clusters are shown in Fig. 2. Chloe and William are shown as master minds or the central persons in their respective clusters. We have used a simple data set so that the readers can easily understand the functionality of the tool. Besides the PEVNET layout, several menu items in the desktop are shown. In this menu item, there is a date filter menu item is shown in Fig. 5. The nodes with the selected crime types are clustered in such a way that the cluster seems to pop up from the original network snapshot as shown in Fig. 2 [6]. The analyst can shuffle the date calendar and can easily monitor the criminal activity over time. The next menu item is the crime type filter list item, showing different crime types. In the list item, the crime type numbers, called the IUCR or Illinois Uniform Crime Reporting, and their respective color legends are shown on the left and the right hand sides of the crime types, respectively. For the user s convenience, the color legend list with the same design is displayed on the right hand side as the legend list menu item. One can also find the map showing the geographical locations of the crime sights in Fig. 3. The trend analysis feature [6] as shown in Fig. 4, is used to detect variations in criminal activity over some span of time, for instance the reported crimes of the whole year It helps the analyst in the prediction of certain criminal activity. For instance, the variation of various crime types is shown by IUCR number of the respective crime types in Fig. 4. The first column shows the month titles while the first row shows the titles of crime types along with the respective IUCRs. For instance, the first column shows the decrease in the activity of the crime type Hallucinogens during the months of September, October, November, and December in the years The yellow color of the small circles corresponds to the respective legend colors, shown in the top right menu. The information about the names of the crime types can be found from the crime type filter menu item. So, all the features of PEVNET complement each other in one way or another to facilitate the analysts. We use random positioning techniques in the PEVNET layout. Due to which, the nodes are seen randomly on the graph layout. The nodes are geographically distributed with respect to the crime locations as provided in the datasets of the example as shown in Fig. 3, i.e., the similar nodes feature [15]. A crime location is comprised of longitude and latitude in the crime report. A display structure is used to represent a node in the graphical user interface (GUI). This display structure is primarily based on a circle, in the case of nodes, but with extended features. With the extended features, the demarcation between the different sub-groups has been shown in some of the PEVNET features; for instance, the collaborating sub-cluster feature. In PEVNET, the detection of similar crime is of vital importance. Occasionally, it is needed during crime investigation. The analyst is required to search persons (nodes) that are dealing with some crime types. He will select any node that is involved in for instance Heroin in the network by watching the legend panel. The system will automatically make those nodes appear prominently which are linked with Heroin crime type as shown in the location window in the Fig. 3. In our previous work [15], our proposed visualizing similar node feature has been shown in Fig. 2. With the visualizing similar node feature, the analyst can study the nodes, which 100

5 Figure 4. Different crime types are shown with the perspective of Trend analysis feature. have the same types of crime but are located at some distance apart in some other geographical locations. A. Case Study We use a case study based on the data from the Chicago narcotics datasets used by the Chicago Police Department (CPD) to demonstrate the framework. It is available in excel file format. The format in Microsoft Excel is more understandable to the majority of users. The format helped us a lot during the system evaluation since the users could validate their findings by comparing their results from the excel sheet. B. Detecting Collaborating Sub-Clusters Feature It is difficult to find information about the sub-clusters which is hidden from the naked eye of the analyst while he is performing the analysis. There is a need for advanced techniques to navigate through the networks. Sometimes, the networks need to be inverted in some dimension in such a way that the information is revealed. In some cases, the external references, i.e., the links outside the networks, act as a vital source of information. In many of the cases, the external links are sometimes the master minds of the crimes. In PEVNET, there is a provision of a detecting collaborating sub-cluster feature, with the help of which the information is shown by selecting the crime type information from the menu and the nodes colors. The analyst can detect sub-clusters inside the network upon finding the information about certain crime types. The information is revealed if any node has got more than one colors. Since there is chance for the possible involvement of the suspects in some other co-offending crimes; such information may be disclosed upon interrogation of the suspect. It is a vital part of IA. The proposed detecting collaborating sub-cluster feature addresses this issue and extracts the hidden crimes about the co-offending criminal networks. PEVNET displays the relevant information of the collaborating crimes with the help of a variety of color combinations. Each crime type is depicted with different crime legends as shown in Fig. 5. The detecting collaborating sub-cluster feature can be understood by examining Figs. 1 and 2. In Fig. 1, the node William is shown to have been involved in Cannabis 30 gms. or less, a crime with the code 1811 and Hallucinogens The other collaborating nodes are Madison, Olivia, and Alexander. By watching the information of the node Williams from the legend information on the PEVNET desktop, it can be seen that Williams has been involved in Cannabis 30 gms. or less, a crime with the code 1811 and Hallucinogens (2025). Since 1811 and 2025 crime types are shown by bright green and dull green colors in the legend information and William is also shown to have been involved in same colors in Fig.1. So we can easily infer that William is detected to have been in 1811 and 2025 crime types. We can find the effectiveness of the detecting collaborating sub-cluster feature by making the filtration of the information. For instance, a node Chloe was involved in three crime types, i.e., Cannabis 30 gms. or less 1811, Heroin (white) denoted as 2024 and Hallucinogens 2025 as shown in Fig.1. The filtered information has revealed the information about Chloe in the case of Hallucinogens. The other collaborating nodes are Emily and Daniel as shown in Fig. 2. Also, the information of the node Chloe from the pie-chart information can be found. We take another example of detecting collaborating sub-cluster feature. Chloe is shown to have been involved in Heroin and Hallucinogens as shown by two legend colors in Fig. 5. The collaboration or involvement of Chloe with other nodes Ethan, Michael, Mia, Noah, and Jayden in the crime of Heroin is shown clearly. There were overheads of both the analyst s precious time and computation in getting such information in the past. It can now be retrieved easily by using the detecting collaborating sub-cluster feature. V. CONCLUSION This paper is a tool demonstration paper and it has demonstrated a criminal network visualization tool. With a variety of network visualization and clustering features along with features based on temporal datasets, the crime analysts is provided with enhanced support for decision making. With the use of the proposed features, criminal network analysis will become more productive as the analysts is expected to get more time to concentrate on 101

6 Figure 5. A person Chloe is shown to have been involved in collaboration with respect to the Heroin (white) crime type. subsequent issues rather than having to deal with the complexities and detail as in the past. REFERENCES [1] R. R. Petersen. "Criminal Network Investigation: Processes, Tools, and Techniques". Diss. SDUSDU, Det Tekniske FakultetFaculty of Engineering, Mærsk Mc-Kinney Møller Instituttet, [2] H. Ebel, J. Davidsen, and S. Bornholdt. "Dynamics of social networks." Complexity 8, no. 2 (2002): Analysis and visualization of criminal networks. [3] J. S. Yi, Youn ah Kang, J. T. Stasko, and J. A. Jacko "Toward a deeper understanding of the role of interaction in information visualization. Visualization and Computer Graphics, IEEE Transactions on 13.6 : [4] J. J. Xu and H. Chen, CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery University of Arizona, ACM Transactions on Information Systems (TOIS), Volume 23 Issue 2, April 2005, Pages , [5] K. Ehrlich and I. Carboni, Inside Social Network Analysis, [6] A. Rasheed, and U. K. Wiil, 2014 The 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014). IEEE Computer Society Press, s s. [7] S. K. Card, J. D. Mackinlay, and B. Schneiderman, "Readings in information visualization: using vision to think". Morgan Kaufmann Publishers, [8] B. Shneiderman, "The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations", [9] J. Schroeder, COPLINK: Database Integration and Access for a Law Enforcement Intranet, National Criminal Justice Reference Service (NCJRS), [10] P. Josch, N. Alcaraz, A. Junge, and J. Baumbach, "KeyPathwayMiner 4.0: Condition-specific pathway analysis by combining multiple OMICs studies and networks", [11] U. K. Wiil, N. Memon, and J. Gniadek, Crimefighter: A toolbox for counterterrorism, in Knowledge Discovery, Knowlege Engineering and Knowledge Management, ser. Communications in Computer and Information Science, A. Fred, J. L. G. Dietz, K. Liu, and J. Filipe, Eds.Springer Berlin Heidelberg, 2011, vol. 128, pp , [12] R. R. Petersen and U. K. Wiil. Crimefighter investigator: A novel tool for criminal network investigation, European Intelligence and Security Informatics Conference (EISIC), sept. 2011, pp , [13] U. K. Wiil, J. Gniadek, and N. Memon, Crimefighter assitant: A knowledge managment tool for terrorist network analysis, in International Conference on Knowledge Management and Information Sharing (KMIS 2010). INSTICC Press, 2010, pp , [14] W. Wright, D. Schroh, P. Proulx, A. Skaburskis, and B. Cort, The sandbox for analysis: Concepts and methods, in ACM CHI, April 2006, pp [15] A. Rasheed and U.K. Wiil, Novel Visualization Features of Temporal Data Using PEVNET, Multidisciplinary Social Networks Research: International Conference, MISNC Springer, s s [16] D. H. Harris, Human Factors and Ergonomics Society. Article in a journal: [17] A. Rasheed and Uffe Kock Wiil, Novel Analysis and Visualization Features in PEVNET, The Maersk Mc-Kinney Moeller Institute University of Southern Denmark Campusvej 55, 5230 Odense M, Denmark. Submitted for acceptance, unpublished. 102

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil

CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes,

More information

Interactive Information Visualization of Trend Information

Interactive Information Visualization of Trend Information Interactive Information Visualization of Trend Information Yasufumi Takama Takashi Yamada Tokyo Metropolitan University 6-6 Asahigaoka, Hino, Tokyo 191-0065, Japan [email protected] Abstract This paper

More information

Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004

Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Data Visualization Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Contents Brief Overview of ArcMap Goals of the Exercise Computer

More information

TIBCO Spotfire Business Author Essentials Quick Reference Guide. Table of contents:

TIBCO Spotfire Business Author Essentials Quick Reference Guide. Table of contents: Table of contents: Access Data for Analysis Data file types Format assumptions Data from Excel Information links Add multiple data tables Create & Interpret Visualizations Table Pie Chart Cross Table Treemap

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

QUALITY TOOLBOX. Understanding Processes with Hierarchical Process Mapping. Robert B. Pojasek. Why Process Mapping?

QUALITY TOOLBOX. Understanding Processes with Hierarchical Process Mapping. Robert B. Pojasek. Why Process Mapping? QUALITY TOOLBOX Understanding Processes with Hierarchical Process Mapping In my work, I spend a lot of time talking to people about hierarchical process mapping. It strikes me as funny that whenever I

More information

Creating a Tableau Data Visualization on Cincinnati Crime By Jeffrey A. Shaffer

Creating a Tableau Data Visualization on Cincinnati Crime By Jeffrey A. Shaffer Creating a Tableau Data Visualization on Cincinnati Crime By Jeffrey A. Shaffer Step 1 Gather and Compile the Data: This data was compiled using weekly files provided by the Cincinnati Police. Each file

More information

White Paper April 2006

White Paper April 2006 White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5

More information

Interactive information visualization in a conference location

Interactive information visualization in a conference location Interactive information visualization in a conference location Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni Istituto di Ricerche sulla Popolazione e Politiche Sociali, CNR, Via Nizza 128, 00198

More information

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the

More information

An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration

An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration An Interactive Visualization Tool for the Analysis of Multi-Objective Embedded Systems Design Space Exploration Toktam Taghavi, Andy D. Pimentel Computer Systems Architecture Group, Informatics Institute

More information

Dynamic Visualization and Time

Dynamic Visualization and Time Dynamic Visualization and Time Markku Reunanen, [email protected] Introduction Edward Tufte (1997, 23) asked five questions on a visualization in his book Visual Explanations: How many? How often? Where? How

More information

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some

More information

The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations. Ben Shneiderman, 1996

The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations. Ben Shneiderman, 1996 The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations Ben Shneiderman, 1996 Background the growth of computing + graphic user interface 1987 scientific visualization 1989 information

More information

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES 43 Chapter 4 NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES Chapter Overview This chapter provides an overview for the next six chapters. Based on research conducted at the University of Arizona

More information

A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes

A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes A Proposed Data Mining Model to Enhance Counter- Criminal Systems with Application on National Security Crimes Dr. Nevine Makram Labib Department of Computer and Information Systems Faculty of Management

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

Visual Analysis Tool for Bipartite Networks

Visual Analysis Tool for Bipartite Networks Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features

More information

Graphical Web based Tool for Generating Query from Star Schema

Graphical Web based Tool for Generating Query from Star Schema Graphical Web based Tool for Generating Query from Star Schema Mohammed Anbar a, Ku Ruhana Ku-Mahamud b a College of Arts and Sciences Universiti Utara Malaysia, 0600 Sintok, Kedah, Malaysia Tel: 604-2449604

More information

Intermediate PowerPoint

Intermediate PowerPoint Intermediate PowerPoint Charts and Templates By: Jim Waddell Last modified: January 2002 Topics to be covered: Creating Charts 2 Creating the chart. 2 Line Charts and Scatter Plots 4 Making a Line Chart.

More information

MARS STUDENT IMAGING PROJECT

MARS STUDENT IMAGING PROJECT MARS STUDENT IMAGING PROJECT Data Analysis Practice Guide Mars Education Program Arizona State University Data Analysis Practice Guide This set of activities is designed to help you organize data you collect

More information

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University

More information

Visualization of Phylogenetic Trees and Metadata

Visualization of Phylogenetic Trees and Metadata Visualization of Phylogenetic Trees and Metadata November 27, 2015 Sample to Insight CLC bio, a QIAGEN Company Silkeborgvej 2 Prismet 8000 Aarhus C Denmark Telephone: +45 70 22 32 44 www.clcbio.com [email protected]

More information

Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics

Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics Paper 3323-2015 Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics ABSTRACT Stephen Overton, Ben Zenick, Zencos Consulting Network diagrams in SAS

More information

Data Mining for Digital Forensics

Data Mining for Digital Forensics Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected

More information

Visualizing the Top 400 Universities

Visualizing the Top 400 Universities Int'l Conf. e-learning, e-bus., EIS, and e-gov. EEE'15 81 Visualizing the Top 400 Universities Salwa Aljehane 1, Reem Alshahrani 1, and Maha Thafar 1 [email protected], [email protected], [email protected]

More information

TIBCO Spotfire Network Analytics 1.1. User s Manual

TIBCO Spotfire Network Analytics 1.1. User s Manual TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Excel -- Creating Charts

Excel -- Creating Charts Excel -- Creating Charts The saying goes, A picture is worth a thousand words, and so true. Professional looking charts give visual enhancement to your statistics, fiscal reports or presentation. Excel

More information

Sign Inventory and Management (SIM) Program Introduction

Sign Inventory and Management (SIM) Program Introduction Sign Inventory and Management (SIM) Program Introduction A Sign Inventory and Management (SIM) Program is an area of asset management that focuses specifically on creating an inventory of traffic signs

More information

Create a Poster Using Publisher

Create a Poster Using Publisher Contents 1. Introduction 1. Starting Publisher 2. Create a Poster Template 5. Aligning your images and text 7. Apply a background 12. Add text to your poster 14. Add pictures to your poster 17. Add graphs

More information

Introduction to ArcView 3.2a

Introduction to ArcView 3.2a Introduction to ArcView 3.2a Training Center U.S. Geological Survey Center for Earth Resources Observation and Science (EROS) Sioux Falls, South Dakota, USA Introduction to ArcView 3.2a Introduction to

More information

The Value of Visualization for Understanding Data and Making Decisions

The Value of Visualization for Understanding Data and Making Decisions September 24, 2014 The Value of Visualization for Understanding Data and Making Decisions John Stasko School of Interactive Computing Georgia Institute of Technology [email protected] JISIC 2014 Data

More information

Tracking System for GPS Devices and Mining of Spatial Data

Tracking System for GPS Devices and Mining of Spatial Data Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja

More information

A Statistical Text Mining Method for Patent Analysis

A Statistical Text Mining Method for Patent Analysis A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, [email protected] Abstract Most text data from diverse document databases are unsuitable for analytical

More information

Data Warehouse Snowflake Design and Performance Considerations in Business Analytics

Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Journal of Advances in Information Technology Vol. 6, No. 4, November 2015 Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Jiangping Wang and Janet L. Kourik Walker

More information

Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas

Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas Understanding BEx Query Designer: Part-2 Structures, Selections and Formulas Applies to: SAP NetWeaver BW. Summary This document is the second installment of a 6 part Query Designer Training guide for

More information

GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL CLUSTERING

GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL CLUSTERING Geoinformatics 2004 Proc. 12th Int. Conf. on Geoinformatics Geospatial Information Research: Bridging the Pacific and Atlantic University of Gävle, Sweden, 7-9 June 2004 GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL

More information

Formulas, Functions and Charts

Formulas, Functions and Charts Formulas, Functions and Charts :: 167 8 Formulas, Functions and Charts 8.1 INTRODUCTION In this leson you can enter formula and functions and perform mathematical calcualtions. You will also be able to

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

Big Data: Rethinking Text Visualization

Big Data: Rethinking Text Visualization Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important

More information

Data Visualization. Brief Overview of ArcMap

Data Visualization. Brief Overview of ArcMap Data Visualization Prepared by Francisco Olivera, Ph.D., P.E., Srikanth Koka and Lauren Walker Department of Civil Engineering September 13, 2006 Contents: Brief Overview of ArcMap Goals of the Exercise

More information

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti

More information

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database

More information

Data representation and analysis in Excel

Data representation and analysis in Excel Page 1 Data representation and analysis in Excel Let s Get Started! This course will teach you how to analyze data and make charts in Excel so that the data may be represented in a visual way that reflects

More information

A Guide for Writing a Technical Research Paper

A Guide for Writing a Technical Research Paper A Guide for Writing a Technical Research Paper Libby Shoop Macalester College, Mathematics and Computer Science Department 1 Introduction This document provides you with some tips and some resources to

More information

an introduction to VISUALIZING DATA by joel laumans

an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA iii AN INTRODUCTION TO VISUALIZING DATA by Joel Laumans Table of Contents 1 Introduction 1 Definition Purpose 2 Data

More information

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results , pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department

More information

Handling the Complexity of RDF Data: Combining List and Graph Visualization

Handling the Complexity of RDF Data: Combining List and Graph Visualization Handling the Complexity of RDF Data: Combining List and Graph Visualization Philipp Heim and Jürgen Ziegler (University of Duisburg-Essen, Germany philipp.heim, [email protected]) Abstract: An

More information

Scatter Plots with Error Bars

Scatter Plots with Error Bars Chapter 165 Scatter Plots with Error Bars Introduction The procedure extends the capability of the basic scatter plot by allowing you to plot the variability in Y and X corresponding to each point. Each

More information

TEXT-FILLED STACKED AREA GRAPHS Martin Kraus

TEXT-FILLED STACKED AREA GRAPHS Martin Kraus Martin Kraus Text can add a significant amount of detail and value to an information visualization. In particular, it can integrate more of the data that a visualization is based on, and it can also integrate

More information

Pure1 Manage User Guide

Pure1 Manage User Guide User Guide 11/2015 Contents Overview... 2 Pure1 Manage Navigation... 3 Pure1 Manage - Arrays Page... 5 Card View... 5 Expanded Card View... 7 List View... 10 Pure1 Manage Replication Page... 11 Pure1

More information

Copyright EPiServer AB

Copyright EPiServer AB Table of Contents 3 Table of Contents ABOUT THIS DOCUMENTATION 4 HOW TO ACCESS EPISERVER HELP SYSTEM 4 EXPECTED KNOWLEDGE 4 ONLINE COMMUNITY ON EPISERVER WORLD 4 COPYRIGHT NOTICE 4 EPISERVER ONLINECENTER

More information

Remote Usability Evaluation of Mobile Web Applications

Remote Usability Evaluation of Mobile Web Applications Remote Usability Evaluation of Mobile Web Applications Paolo Burzacca and Fabio Paternò CNR-ISTI, HIIS Laboratory, via G. Moruzzi 1, 56124 Pisa, Italy {paolo.burzacca,fabio.paterno}@isti.cnr.it Abstract.

More information

As noted in previous chapters, crime analysis relies heavily on computer

As noted in previous chapters, crime analysis relies heavily on computer 07-Boba-4723.qxd 6/9/2005 3:43 PM Page 101 7 Crime Analysis Technology As noted in previous chapters, crime analysis relies heavily on computer technology, and over the past 15 years significant improvements

More information

Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator

Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator Victoria L. Lemieux 1,2, Benjamin W.K. Shieh 2, David

More information

SuperViz: An Interactive Visualization of Super-Peer P2P Network

SuperViz: An Interactive Visualization of Super-Peer P2P Network SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes

More information

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Crime Hotspots Analysis in South Korea: A User-Oriented Approach , pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk

More information

Visualization methods for patent data

Visualization methods for patent data Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Latin American and Caribbean Flood and Drought Monitor Tutorial Last Updated: November 2014

Latin American and Caribbean Flood and Drought Monitor Tutorial Last Updated: November 2014 Latin American and Caribbean Flood and Drought Monitor Tutorial Last Updated: November 2014 Introduction: This tutorial examines the main features of the Latin American and Caribbean Flood and Drought

More information

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers 60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered

More information

ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS

ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS DATABASE MARKETING Fall 2015, max 24 credits Dead line 15.10. ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS PART A Gains chart with excel Prepare a gains chart from the data in \\work\courses\e\27\e20100\ass4b.xls.

More information

Security visualisation

Security visualisation Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco

More information

Purdue University Writing Lab Indiana Department of Transportation Workshop Series Dr. David Blakesley, Allen Brizee

Purdue University Writing Lab Indiana Department of Transportation Workshop Series Dr. David Blakesley, Allen Brizee Designing Research Posters This handout explains how to use effective design strategies to compose research posters. Research Posters Catch Reader s Attention and Make Key Information Understandable Research

More information

Designing a Graphical User Interface

Designing a Graphical User Interface Designing a Graphical User Interface 1 Designing a Graphical User Interface James Hunter Michigan State University ECE 480 Design Team 6 5 April 2013 Summary The purpose of this application note is to

More information

NakeDB: Database Schema Visualization

NakeDB: Database Schema Visualization NAKEDB: DATABASE SCHEMA VISUALIZATION, APRIL 2008 1 NakeDB: Database Schema Visualization Luis Miguel Cortés-Peña, Yi Han, Neil Pradhan, Romain Rigaux Abstract Current database schema visualization tools

More information

Getting Started with GRUFF

Getting Started with GRUFF Getting Started with GRUFF Introduction Most articles in this book focus on interesting applications of Linked Open Data (LOD). But this chapter describes some simple steps on how to use a triple store,

More information

MicroStrategy Desktop

MicroStrategy Desktop MicroStrategy Desktop Quick Start Guide MicroStrategy Desktop is designed to enable business professionals like you to explore data, simply and without needing direct support from IT. 1 Import data from

More information

OECD.Stat Web Browser User Guide

OECD.Stat Web Browser User Guide OECD.Stat Web Browser User Guide May 2013 May 2013 1 p.10 Search by keyword across themes and datasets p.31 View and save combined queries p.11 Customise dimensions: select variables, change table layout;

More information

About PivotTable reports

About PivotTable reports Page 1 of 8 Excel Home > PivotTable reports and PivotChart reports > Basics Overview of PivotTable and PivotChart reports Show All Use a PivotTable report to summarize, analyze, explore, and present summary

More information

<no narration for this slide>

<no narration for this slide> 1 2 The standard narration text is : After completing this lesson, you will be able to: < > SAP Visual Intelligence is our latest innovation

More information

Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients

Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients Technical Paper Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients A practical introduction to SAS Information Map Studio and SAS Web Report Studio for new and experienced

More information

The US Bridge Portal -Visualization Analytics Applications for the National Bridge Inventory (NBI) Database

The US Bridge Portal -Visualization Analytics Applications for the National Bridge Inventory (NBI) Database The US Bridge Portal -Visualization Analytics Applications for the National Bridge Inventory (NBI) Database Matija Radovic #1, Dr. Offei Adarkwa #2 1 Civil and Environmental Engineering Department, University

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

Analytics with Excel and ARQUERY for Oracle OLAP

Analytics with Excel and ARQUERY for Oracle OLAP Analytics with Excel and ARQUERY for Oracle OLAP Data analytics gives you a powerful advantage in the business industry. Companies use expensive and complex Business Intelligence tools to analyze their

More information

Creating Accessible Word Documents

Creating Accessible Word Documents Center for Faculty Development and Support Creating Accessible Word Documents With Microsoft Word 2008 for Macintosh CREATING ACCESSIBLE WORD DOCUMENTS 3 Overview 3 Learning Objectives 3 Prerequisites

More information

A Tutorial on dynamic networks. By Clement Levallois, Erasmus University Rotterdam

A Tutorial on dynamic networks. By Clement Levallois, Erasmus University Rotterdam A Tutorial on dynamic networks By, Erasmus University Rotterdam V 1.0-2013 Bio notes Education in economics, management, history of science (Ph.D.) Since 2008, turned to digital methods for research. data

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Data Doesn t Communicate Itself Using Visualization to Tell Better Stories

Data Doesn t Communicate Itself Using Visualization to Tell Better Stories SAP Brief Analytics SAP Lumira Objectives Data Doesn t Communicate Itself Using Visualization to Tell Better Stories Tap into your data big and small Tap into your data big and small In today s fast-paced

More information

Step 2: Learn where the nearest divergent boundaries are located.

Step 2: Learn where the nearest divergent boundaries are located. What happens when plates diverge? Plates spread apart, or diverge, from each other at divergent boundaries. At these boundaries new ocean crust is added to the Earth s surface and ocean basins are created.

More information

Topic Maps Visualization

Topic Maps Visualization Topic Maps Visualization Bénédicte Le Grand, Laboratoire d'informatique de Paris 6 Introduction Topic maps provide a bridge between the domains of knowledge representation and information management. Topics

More information

TOP New Features of Oracle Business Intelligence 11g

TOP New Features of Oracle Business Intelligence 11g 10 TOP New Features of Oracle Business Intelligence 11g TABLE OF CONTENTS Feature 1 New Chart Choices Funnel Chart 2 Trellis Chart 3 Waterfall 4 Tile Diagram 5 Feature 2 Recommended Visualization 6 Feature

More information

Seeing by Degrees: Programming Visualization From Sensor Networks

Seeing by Degrees: Programming Visualization From Sensor Networks Seeing by Degrees: Programming Visualization From Sensor Networks Da-Wei Huang Michael Bobker Daniel Harris Engineer, Building Manager, Building Director of Control Control Technology Strategy Development

More information

Business Process Discovery

Business Process Discovery Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process

More information

2 SYSTEM DESCRIPTION TECHNIQUES

2 SYSTEM DESCRIPTION TECHNIQUES 2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange

More information

Information Literacy Program

Information Literacy Program Information Literacy Program Excel (2013) Advanced Charts 2015 ANU Library anulib.anu.edu.au/training [email protected] Table of Contents Excel (2013) Advanced Charts Overview of charts... 1 Create a chart...

More information

Bitrix Site Manager 4.1. User Guide

Bitrix Site Manager 4.1. User Guide Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing

More information

Spotfire v6 New Features. TIBCO Spotfire Delta Training Jumpstart

Spotfire v6 New Features. TIBCO Spotfire Delta Training Jumpstart Spotfire v6 New Features TIBCO Spotfire Delta Training Jumpstart Map charts New map chart Layers control Navigation control Interaction mode control Scale Web map Creating a map chart Layers are added

More information

PURPOSE OF GRAPHS YOU ARE ABOUT TO BUILD. To explore for a relationship between the categories of two discrete variables

PURPOSE OF GRAPHS YOU ARE ABOUT TO BUILD. To explore for a relationship between the categories of two discrete variables 3 Stacked Bar Graph PURPOSE OF GRAPHS YOU ARE ABOUT TO BUILD To explore for a relationship between the categories of two discrete variables 3.1 Introduction to the Stacked Bar Graph «As with the simple

More information

Lasse Cronqvist. Email: [email protected]. Tosmana. TOol for SMAll-N Analysis. version 1.2. User Manual

Lasse Cronqvist. Email: lasse@staff.uni-marburg.de. Tosmana. TOol for SMAll-N Analysis. version 1.2. User Manual Lasse Cronqvist Email: [email protected] Tosmana TOol for SMAll-N Analysis version 1.2 User Manual Release: 24 th of January 2005 Content 1. Introduction... 3 2. Installing Tosmana... 4 Installing

More information