von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 078 01 - Diskussion Zuletzt bearbeitet: 2012-04-29 22:28:10 Hindemith | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a |
|
|
Untersuchte Arbeit: Seite: 78, Zeilen: 1-13 |
Quelle: Xu and Chen 2005a Seite(n): 103, Zeilen: left column 49-52 and right column 14-28 |
---|---|
[It is to mention that, Analyst’s Notebook (see Figure 2.3) can automatically generate a link chart] based on relational data from a spread sheet or text file.
Though second generation tools are capable of using a number of methods to visualize criminal networks, their sophistication level is not up to the mark because they only produce graphical representation of criminal networks with less analytical functionality. These tools still rely on analysts to investigate the graphs with awareness to detect structural properties of the network. [...] Third generation: SNA. This generation provides more advanced functionality to help the law enforcement professionals in crime investigations. Complex structural analysis tools are needed to visualization facility in addition of mining large amount of data in order to discover useful knowledge about the structure and organization of criminal networks. |
For example, Analyst’s Notebook can automatically generate a link chart based on relational data from a spreadsheet or text file (Figure 2a).
[...] Although second-generation tools are capable of using various methods to visualize criminal networks, their sophistication level remains modest because they produce only graphical representations of criminal networks without much analytical functionality. They still rely on analysts to study the graphs with awareness to find structural properties of the network. Third generation: SNA. This approach is expected to provide more advanced analytical functionality to assist crime investigation. Sophisticated structural analysis tools are needed to go from merely drawing networks to mining large volumes of data to discover useful knowledge about the structure and organization of criminal networks. |
continuation from previous page |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120429222834