von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 191 01 - Diskussion Zuletzt bearbeitet: 2012-04-29 17:56:16 Graf Isolan | Fragment, Gesichtet, Heer et al 2005, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 191, Zeilen: 1-6 |
Quelle: Heer et al 2005 Seite(n): 10 (internet version), Zeilen: left column 4-6, 13-15 |
---|---|
[The Prefuse is] part of a larger move to systematize information visualization research and bring more interactivity into data analysis and exploration.
The Prefuse is open-source software. The toolkit, source code, and both interactive and video demonstrations are available at http://Prefuse.sourceforge.net. |
prefuse is part of a larger move to systematize information visualization research and bring more interactivity into data analysis and exploration.
prefuse is open-source software. The toolkit, source code, and both interactive and video demonstrations are available at http://prefuse.sourceforge.net. |
continued from previous page; this section concludes both the take-over and the original paper. |
|
[2.] Nm/Fragment 191 10 - Diskussion Zuletzt bearbeitet: 2012-04-29 17:58:30 Graf Isolan | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a |
|
|
Untersuchte Arbeit: Seite: 191, Zeilen: 10-19 |
Quelle: Xu and Chen 2005a Seite(n): 104-105, Zeilen: p.104, right column 15-22 - p.105, left column 1-4 |
---|---|
6.4 SUBGROUP DETECTION [FN 33]
A terrorist network can often be partitioned into cells (subgroups) consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in the data. Hierarchical clustering methods have been proposed to partition a network into subgroups (Wasserman, S., and Faust, K., 1994). Cliques whose members are fully or almost fully connected can also be detected based on clustering results. [FN 33] The most of the material presented in this Section is already published in (Memon N., Larsen Henrik Legind, 2006c) |
[p. 104]
Subgroup detection A criminal network can often be partitioned into subgroups consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in [p. 105] the data. Hierarchical clustering methods have been proposed to partition a network into subgroups [EN 11]. Cliques whose members are fully or almost fully connected can also be detected based on clustering results. [EN 11] Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications (Cambridge: Cambridge University Press, 1994). |
Indeed: not only does this paragraph appear here in Nm's thesis but also in a number of Nm's papers, the earliest being a contribution to a conference in November 2005 and appearing here [1]. Thus the formulation by Xu and Chen (2005a) presented here still predates any analogous text by Nm by at least several months. Nm's only contribution has been to change the object of research from "criminals" to "terrorists". This furthermore begs the question if Nm's iMiner software prototype, which is at the heart of his thesis is far from Xu and Chen's CrimeNet explorer. |
|
[3.] Nm/Fragment 191 20 - Diskussion Zuletzt bearbeitet: 2012-04-29 17:57:54 Graf Isolan | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a |
|
|
Untersuchte Arbeit: Seite: 191, Zeilen: 20-25 |
Quelle: Xu and Chen 2005a Seite(n): 106, Zeilen: right column 15-23 |
---|---|
In this research and development study, we employed SNA techniques for terrorist intelligence analysis. The goal has been to provide law enforcement and intelligence agencies with third-generation network analysis techniques that not only produce graphical representations of terrorist networks but also provide structural analysis functionality to facilitate terrorist investigations. | Several data mining projects in the COPLINK research have begun to employ these SNA techniques for criminal network analysis. The goal has been to provide law enforcement and intelligence agencies with third-generation network analysis techniques that not only produce graphical representations of criminal networks but also provide structural analysis functionality to facilitate crime investigations. |
continues the take-over from Xu and Chen (2005a) (but from a different page than before) |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Graf Isolan, Zeitstempel: 20120429180001