1 / 9

Information Analysis

Information Analysis. Knowledge Mining/Threat Prediction. Organizational Knowledge. Knowledge. Knowledge we have and don’t know we have it and do not use it. Knowledge we have and know we have it and use it. Meta-Knowledge. X. Knowledge don’t we have and we know that. Discover!!.

meira
Download Presentation

Information Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Analysis Knowledge Mining/Threat Prediction CSE 8394

  2. Organizational Knowledge Knowledge Knowledge we have and don’t know we have it and do not use it Knowledge we have and know we have it and use it Meta-Knowledge X Knowledge don’t we have and we know that Discover!! CSE 8394

  3. Knowledge Discovery Knowledge Discovery Link Analysis Data Mining Unstructured Data CSE 8394

  4. Data Mining • Process of extracting hidden knowledge from raw data • Targeted marketing • Cross-sell opportunities • Customer profiling • Supply chain? • Power, traffic distribution • Why data mining • Huge volumes of data • Limitations of human analysis • Low cost of machine learning (bigger trend that outsourcing!!) CSE 8394

  5. DM Methods • Neural Networks • Evolutionary Programming • Memory Based Reasoning • Decision Trees • Genetic Algorithms • Nonlinear Regression Methods CSE 8394

  6. Graph-Based Link Analysis • The “friends” problem • Understanding the underlying relationships • Prediction of future relationship • Premise • Entities connected through noisy relationships • Question to answer • Given the collaborative graph, who are the top K friends? • Who could be friends in future? CSE 8394

  7. Text Mining with Link Analysis • Reported experiments on • Connection between a terrorist and known figure • Meetings between US and Israel • Approaches to link construction • Co-occurrence links • Semantic links • Quality metrics • Accuracy • Recall CSE 8394

  8. Link Discovery in Battlespace • Information fusion should progress beyond current level 1 (object refinement) • Focus on Continuous Intelligence Preparation of the Battlespace (CIPB) • Develop DA to aid human analyst to determine enemy COA • Leverage technologies such as mobile agent architecture, link discovery and analysis • Sample scenario analysis CSE 8394

  9. Related Message Traffic • Constructing conversations when conventional markers are missing • Look for statistical anomalies • Application of SVD and ICA (Independent Component Analysis) to noun frequency profiles • Application in counter terrorism and fraud CSE 8394

More Related