Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 144 13 - Diskussion Zuletzt bearbeitet: 2012-05-22 19:22:25 Hindemith | Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop, Stephenson and Zelen 1989 |
|
|
Untersuchte Arbeit: Seite: 144, Zeilen: 13-15 |
Quelle: Stephenson and Zelen 1989 Seite(n): 27, Zeilen: 34-36 |
---|---|
This chapter attempted to illustrate the calculation of centralities to these prototypical situations. However we regard our efforts in this direction as only a beginning. | We have attempted to illustrate the calculation of centralities to these prototypical situations. However we regard our efforts in this direction as only a beginning. |
This piece is taken word-for-word from the conclusion of the paper which functioned as an unreferenced source. The sentences following will be taken from one of the second of the paper's introductory chapters. |
|
[2.] Nm/Fragment 144 16 - Diskussion Zuletzt bearbeitet: 2012-05-22 19:21:09 Hindemith | Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop, Stephenson and Zelen 1989 |
|
|
Untersuchte Arbeit: Seite: 144, Zeilen: 16-21 |
Quelle: Stephenson and Zelen 1989 Seite(n): 3, Zeilen: 28-33 |
---|---|
It is possible that information will take a more circuitous route either by random communication or may be intentionally channelled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality [measure.] | It is quite possible that information will take a more circuitous route either by random communication or may be intentionally channeled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality measure. |
This is supposed to be a part of a summary, which Nm did for this chapter. But in fact it stems verbatim from the unnamed source. This section will appear a second time in Nm's thesis as Nm/Fragment_242_09. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120522192559
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120522192559