Download pptx - Matrix Mapper

Transcript
Page 1: Matrix Mapper

Project Matrix Mapper

Page 2: Matrix Mapper

Developing an Indigenous application matching the capabilities of Analyst’s Notebook.

Page 3: Matrix Mapper

Why we need a strong analytics tool ?

Intelligent data gathering and dissemination.

Managing huge amount of unstructured data. Easy data mining and structured analysis. Centralized database. Instant report generation. Efficient decision making. Pictorial depiction and pattern generation for

better assimilation as also intelligent assessment, inference and extrapolation.

Page 4: Matrix Mapper

ANALYST’S NOTEBOOK

The Matrix Mapper is intended to provide a strong, viable, dependable and effective alternative to the Analyst’s Notebook and to excel the Sentinel Visualizer. Therefore, for clarity in concept & visualization, some images of Analyst’s Notebook have been used.

Page 5: Matrix Mapper

i2 Analyst’s Notebook

Manufacturer – i2 IBM

Export Control Regulation - Only available to businesses, government agencies and

academic institutions operating within the USA

and Russia

Page 6: Matrix Mapper

COMPETITION VIS-A-VIS ANALYST’S NOTEBOOK

Page 7: Matrix Mapper

ANALYST’S NOTEBOOK SENTINEL VISUALIZER

It is a visual intelligence analysis environment that enables to quickly collate, analyze and visualize data from disparate sources.

Is a Windows based application written in Visual Studio .NET supporting an MSDE/SQL Server database. It can connect to a shared server in the office or run on your local database when you are in the field.

It centralizes data from multiple sources. Supports an unlimited number of databases.

The platform provides a flexible data-centric model optimized for multidimensional data analysis, which is a key requirement for collaborative workingenvironments. Increased understanding of the structure, hierarchy, and method of operation of criminal, terrorist and fraudulent networks. Data visualization in 2D.

Data visualization capabilities including 2D and 3D link charts and stereoscopic graphs.

Social Network Analysis (SNA) and quantitative analysis techniques that combine organization theories with mathematical models to help better understand and target the dynamics of groups, networks, and organizations.

Built-in Social Network Analysis and Advanced Network Analysis.

Page 8: Matrix Mapper

ANALYST’S NOTEBOOK SENTINEL VISUALIZER

Searching unstructured data using powerful search capabilities to cast the net wide and deep to ensure that no data is missed in supporting investigative and operational activities.

Name disambiguation through aliases and fuzzy searching.

It requires you to install a hardware dongle in order to start the program.

No hardware dongle required.

Entities in Analyst's Notebook are shown with a built-in graphic by type (e.g. people).

Each entity in Sentinel Visualizer can have its own picture that is displayed directly on your link chart to let you better understand your data.

In Analyst's Notebook, every relationship and line is the same. However the intensity and incidence of relationships is clearly delineated.

Different types of links should be weighted differently (e.g. a brother relationship is very different from two people who attended a meeting). This is, however, not possible in very complex cases with multiple nodes.

Timelines are integral to the defining of incidence and relationships.

Sentinel Visualizer does Temporal Analysis. If your relationships have information with start and/or end times, they can be automatically plotted on a timeline. This lets you quickly see when events occur and for how long.

Page 9: Matrix Mapper

Analyst’s Notebook - Functionality

Page 10: Matrix Mapper

Prediction & TrackingTimeline analysis depicts events as they unfold over time, allowing to understand cause andeffect, identify patterns, and decide upon appropriate courses of action. Entities can be tracked over time,to identify their associations with an event or incident.

Transaction pattern analysis enables display of a seriesof transactions in chronological order. This helps to reveal repetitions in patterns of activity and can help to predict future behavior.Based on its huge data base, Analyst’s Notebook hasthe capability to predict the next event (Probability): Locations Persons involved Time Date

Page 11: Matrix Mapper

CAPABILITIES/EXPERTISE OF AARKTECH AND THEIR DEVELOPMENT ASSOCIATES, KBCRF, IN REGARD TO THE :

MATRIX MAPPER

Page 12: Matrix Mapper

1. SemantiCSKBCRF has tremendous exposure and core competency in the field of Semantics.

Intellectual Property in Computational tools and resources for Indian Languages, like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel Corpora, etc.

Text Analytics Platform - is a multilingual semantic analysis platform which can take any unstructured data (web data, social network data, blogs etc) as input and analyse and bring it to a structured database for further analysis.

2. Big Data Analytics KBCRF has proven capability to work with Big-Data and Text Analytics. MM’s requirement

for vast data gathering and complex event processing mandates a platform that can handle

“Big Data”. Activity Analysis and Fraud Analytics product lines include a Big Data Platform

based on Hadoop that includes workflow, traditional relational databases as well as non-relational (NOSQL) databases.

Information Extraction System extracts information from unstructured text from various domains for information pertinent to the user which can be defined according to the user requirement.

Page 13: Matrix Mapper

3. Knowledge Discovery

A product like MM depends critically on large scale acquisition of data from multiple sources:-

Internal and external sources, open sources and social media. Sources could be structured (credit card transactions, hotel occupancy records

etc) and unstructured (textual case narratives, open sources from the internet etc). The media may range from audio and video to images and text.

SmartConnector Technology accomplishes some of these tasks like crawlers, data base connectors, screen scrapping utilities which are some of the technologies that need to be deployed.

Similarity Analyser semantically clusters documents according to the various relationships that a given document has with other documents.

Indian Language Search Engines.

Translingual Information Accessor for classified advertisements.

Page 14: Matrix Mapper

4. Powerful Visualisation Efficient in technologies ranging from Flex to HTML5 and have developed User

Interfaces for different form factors from traditional web browsers to mobile devices such as smart phones (Android, IOS etc) and tablets.  

Relationships with leading design firms based in USA to bring in expertise and knowhow when required.

5. SNA Named Entity and Event Resolution System is a hybrid system which works for

identifying 106 entity types with nested tags and has been tested with different types of language data.

Entity Relation Identification System is a statistical system which identifies relation between two entities and the sentiments related to it.

6. User definitions Aarktech has immense experience of and exposure to :

Designing and defining the architecture of Matrix Mapper on the lines of Analyst Notebook.

Domain knowledge and industry specific standards.

Page 15: Matrix Mapper

FEATURES OF THE MATRIX MAPPER PROJECT ON THE LINES OF ANALYST’S NOTEBOOK / SENTINEL VISUALIZER

Page 16: Matrix Mapper

Interrelationships among varied Icons

The Matrix Mapper is meant to establish the inter-relationships among hundreds of different people and things that connect persons with persons via communication devices (mobile, landline, satellite, PTT/ SD Radios), credit/ debit cards, banking/ insurance transactions, email, clouds, rail/ road/ plane/ ship/ private transport, addresses, locations, times, geo-spatial linkages, imagery, GIS and numerous other means.

Page 17: Matrix Mapper

Regardless of the language and platform in which data is available, the MM would be able to perform cross platform analytics and convert very large volumes of data into graphics and deploy semantic strengths for knowledge discovery leading to historical and predictive matrices.

Cross Platform Analytics

Analysts’ Notebook Image

Page 18: Matrix Mapper

1. Images, icons, photographs and maps can be swiftly dragged and dropped onto vortex points illustrating connections and relationships.

2. Mapping graphics resulting from relationship analysis, identification (text, images, audio, video) would help identify the key elements in a network after delineating the network itself and its dimensions.

3. The MM would, using icons, images and connectivity indicators, clearly bring out the hierarchy, scaffolding and functioning of the network firmly and clearly.

Mapping Icons and Relationships

Page 19: Matrix Mapper

Activity Spikes for Predictive Inferences

ATMVisit Time & Date

Date Time

Date Time Date Time

Shahdara 05/09/12

15: 35

04/11/12 15:55 03/01/13

16:00

Loni 25/09/12

16:00 24/11/12 15:30 23/01/13

16:10

Sarita Vihar 15/10/12

15:45 14/12/12 16:00 13/02/13

16:30

PredictionNext ATM Withdrawal

Page 20: Matrix Mapper

Social Network

AnalysisCentrality

Between-ness

Closeness

Degree

The identification of strategically placed persons in the network including Key Individuals, Persons with Influence, Gatekeepers etc. would be analyzed alongside modus operandi and activity patterns as the most effective means of ensuring result oriented intelligence for reactive or pro-active measures.

Page 21: Matrix Mapper

EVENT LINKAGE IN Mm

TerrorIncidents

Page 22: Matrix Mapper

ABOUT AARKTECH AND KBCRF

Page 23: Matrix Mapper

KBCRF

The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations

(www.svapas.com) and Serendio (www.serendio.com)

ecosystem brings in proven scientific and technical

skills, product development knowledge and

leadership to undertake the challenging enterprise.

The skill inventory includes development experience

with all modern programming and scripting languages,

various SQL and NOSQL database dialects, data warehousing, algorithms, data

structures, data science, user interface design and development with Flex, HTML,

HTML5. KBCRF follow test-driven development methodologies with continuous

integration, test and deployment.

Page 24: Matrix Mapper

Aarktech

1. Intelligence experience and user domain knowledge - Udayan Mukerji, the

Chief Mentor of Aarktech, has tremendous experience in intelligence scenarios

in India and across the globe. Udayan Mukerji retired from the Indian Police

Service more than three decades of service. During his career, Udayan Mukerji

functioned at various levels and garnered immense experience as well as

thoroughgoing expertise in areas dealing variously with homeland security, the

security of Indian Missions abroad, internal security, communications security

and investigations into security deficiencies. He is the recipient of the

prestigious Indian Police Medal for Meritorious Service and the President's

Medal for Distinguished Service.

2. Aarktech Team is professionally qualified with ‘IT Security’ Industry

knowledge. The motivated team ensures best practices and standards of

product for ultimate customer satisfaction.

Page 25: Matrix Mapper

SBMS : Aarktech – KBCRF

Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED).

SBMS is a highly secure and sophisticated Messaging Solution,conceived and being developed successfully under the expert technical competency of KBCRF and the participation of Aarktech. Some of the distinctive features of SBMS :

A user can login only from his workstation – this prevents somebody from stealing the user ID, password and attempting to break in from some other location. Operate with low latency on small bandwidths. Release, distribution, security, and timely delivery of voice, video, data and messaging

across public and closed networks. Robust LINUX platform at the server end, while interfacing with variety of OS like

Windows, Ubuntu, MAC etc. Capability to function with Android phones, PDAs, hardened smart phone handsets and

other similar mobile devices. Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are

customized as

per client requirement. Enhanced security and data integrity - Two factor authentication for logging on and

encryption of IP traffic using the customised SSO and SSL/ IPSec. Asymmetric keys coupled with key pointers to ensure the most complete security

possible. Granular level of logs to enable forensic analysis of every activity that happens in

messaging application.

Page 26: Matrix Mapper

THANKYOU….

Contact Details: Aarken Technologies Pvt Ltd. C-12, Chirag Enclave, New Delhi-110048. Ph: 011 -26443221 Email: [email protected]


Recommended