VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite

Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende

[1.] Nm/Fragment 191 01 - Diskussion
Zuletzt bearbeitet: 2012-04-29 17:56:16 Graf Isolan
Fragment, Gesichtet, Heer et al 2005, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 191, Zeilen: 1-6
Quelle: Heer et al 2005
Seite(n): 10 (internet version), Zeilen: left column 4-6, 13-15
[The Prefuse is] part of a larger move to systematize information visualization research and bring more interactivity into data analysis and exploration.

The Prefuse is open-source software. The toolkit, source code, and both interactive and video demonstrations are available at http://Prefuse.sourceforge.net.

prefuse is part of a larger move to systematize information visualization research and bring more interactivity into data analysis and exploration.

prefuse is open-source software. The toolkit, source code, and both interactive and video demonstrations are available at http://prefuse.sourceforge.net.

Anmerkungen

continued from previous page;

this section concludes both the take-over and the original paper.

Sichter
(Graf Isolan), Bummelchen


[2.] Nm/Fragment 191 10 - Diskussion
Zuletzt bearbeitet: 2012-04-29 17:58:30 Graf Isolan
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 191, Zeilen: 10-19
Quelle: Xu and Chen 2005a
Seite(n): 104-105, Zeilen: p.104, right column 15-22 - p.105, left column 1-4
6.4 SUBGROUP DETECTION [FN 33]

A terrorist network can often be partitioned into cells (subgroups) consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in the data. Hierarchical clustering methods have been proposed to partition a network into subgroups (Wasserman, S., and Faust, K., 1994). Cliques whose members are fully or almost fully connected can also be detected based on clustering results.

[FN 33] The most of the material presented in this Section is already published in (Memon N., Larsen Henrik Legind, 2006c)

[p. 104]

Subgroup detection

A criminal network can often be partitioned into subgroups consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in

[p. 105]

the data. Hierarchical clustering methods have been proposed to partition a network into subgroups [EN 11]. Cliques whose members are fully or almost fully connected can also be detected based on clustering results.

[EN 11] Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications (Cambridge: Cambridge University Press, 1994).

Anmerkungen

Indeed: not only does this paragraph appear here in Nm's thesis but also in a number of Nm's papers, the earliest being a contribution to a conference in November 2005 and appearing here [1]. Thus the formulation by Xu and Chen (2005a) presented here still predates any analogous text by Nm by at least several months. Nm's only contribution has been to change the object of research from "criminals" to "terrorists".

This furthermore begs the question if Nm's iMiner software prototype, which is at the heart of his thesis is far from Xu and Chen's CrimeNet explorer.

Sichter
(Graf Isolan), Bummelchen


[3.] Nm/Fragment 191 20 - Diskussion
Zuletzt bearbeitet: 2012-04-29 17:57:54 Graf Isolan
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005a

Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Untersuchte Arbeit:
Seite: 191, Zeilen: 20-25
Quelle: Xu and Chen 2005a
Seite(n): 106, Zeilen: right column 15-23
In this research and development study, we employed SNA techniques for terrorist intelligence analysis. The goal has been to provide law enforcement and intelligence agencies with third-generation network analysis techniques that not only produce graphical representations of terrorist networks but also provide structural analysis functionality to facilitate terrorist investigations. Several data mining projects in the COPLINK research have begun to employ these SNA techniques for criminal network analysis. The goal has been to provide law enforcement and intelligence agencies with third-generation network analysis techniques that not only produce graphical representations of criminal networks but also provide structural analysis functionality to facilitate crime investigations.
Anmerkungen

continues the take-over from Xu and Chen (2005a) (but from a different page than before)

Sichter
(Graf Isolan), Bummelchen



vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Graf Isolan, Zeitstempel: 20120429180001