SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Project
Matrix Mapper









Intelligent data gathering and dissemination.
Managing huge amount of unstructured data.
Easy data mining and structured analysis.
Centralized database.
Instant report generation.
Efficient decision making.
Pictorial depiction and pattern generation for
better assimilation as also intelligent
assessment, inference and extrapolation.
The Matrix Mapper is intended to provide a strong, viable,
dependable and effective alternative to the Analyst’s
Notebook and to excel the Sentinel Visualizer. Therefore, for
clarity in concept & visualization, some images of Analyst’s
Notebook have been used.
Manufacturer – i2 IBM
Export Control Regulation - Only available to
businesses, government agencies and
academic institutions operating within the USA
and Russia
COMPETITION VIS-A-VIS
ANALYST‟S NOTEBOOK
ANALYST’S NOTEBOOK

SENTINEL VISUALIZER

It is a visual intelligence analysis environment that
enables to quickly collate, analyze and visualize data
from disparate sources.

Is a Windows based application written in Visual
Studio .NET supporting an MSDE/SQL Server
database. It can connect to a shared server in the
office or run on your local database when you are in
the field.

It centralizes data from multiple sources.

Supports an unlimited number of databases.

The platform provides a flexible data-centric model
optimized for multidimensional data analysis, which is
a key requirement for collaborative working
environments. Increased understanding of the
structure, hierarchy, and method of operation of
criminal, terrorist and fraudulent networks. Data
visualization in 2D.

Data visualization capabilities including 2D and 3D link
charts and stereoscopic graphs.

Social Network Analysis (SNA) and quantitative
analysis techniques that combine organization
theories with mathematical models to help better
understand and target the dynamics of groups,
networks, and organizations.

Built-in Social Network Analysis and Advanced
Network Analysis.
ANALYST’S NOTEBOOK

SENTINEL VISUALIZER

Searching unstructured data using powerful search
capabilities to cast the net wide and deep to ensure
that no data is missed in supporting investigative and
operational activities.

Name disambiguation through aliases and fuzzy
searching.

It requires you to install a hardware dongle in order
to start the program.

No hardware dongle required.

Entities in Analyst's Notebook are shown with a builtin graphic by type (e.g. people).

Each entity in Sentinel Visualizer can have
its own picture that is displayed directly on your link
chart to let you better understand your data.

In Analyst's Notebook, every relationship and line is
the same. However the intensity and incidence of
relationships is clearly delineated.

Different types of links should be weighted differently
(e.g. a brother relationship is very different from two
people who attended a meeting). This is, however, not
possible in very complex cases with multiple nodes.

Timelines are integral to the defining of incidence and
relationships.

Sentinel Visualizer does Temporal Analysis. If your
relationships have information with start and/or end
times, they can be automatically plotted on a
timeline. This lets you quickly see when events occur
and for how long.
Timeline analysis depicts events as they unfold
over time, allowing to understand cause and
effect, identify patterns, and decide upon appropriate
courses of action. Entities can be tracked over time,
to identify their associations with an event or incident.
Transaction pattern analysis enables display of a series
of transactions in chronological order. This helps to
reveal repetitions in patterns of activity and can help to
predict future behavior.
Based on its huge data base, Analyst’s Notebook has
the capability to predict the next event (Probability):
ï‚š
Locations
ï‚š
Persons involved
ï‚š
Time
ï‚š
Date
CAPABILITIES/EXPERTISE OF
AARKTECH AND THEIR DEVELOPMENT
ASSOCIATES, KBCRF, IN REGARD TO
THE :
1. SemantiCS
KBCRF has tremendous exposure and core competency in the field of Semantics.
ï‚Ą Intellectual Property in Computational tools and resources for Indian Languages,
like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel
Corpora, etc.
ï‚Ą Text Analytics Platform - is a multilingual semantic analysis platform which can
take any unstructured data (web data, social network data, blogs etc) as input and
analyse and bring it to a structured database for further analysis.

2. Big Data Analytics
KBCRF has proven capability to work with Big-Data and Text Analytics. MM‟s requirement
for vast data gathering and complex event processing mandates a platform that can handle
“Big Data”.
ï‚Ą Activity Analysis and Fraud Analytics product lines include a Big Data Platform
based on Hadoop that includes workflow, traditional relational databases as well as
non-relational (NOSQL) databases.
ï‚Ą Information Extraction System extracts information from unstructured text from
various domains for information pertinent to the user which can be defined
according to the user requirement.
3. Knowledge Discovery
ï‚Ą

A product like MM depends critically on large scale acquisition of data from multiple
sources: Internal and external sources, open sources and social media.
 Sources could be structured (credit card transactions, hotel occupancy records etc)

and unstructured (textual case narratives, open sources from the internet etc).
 The media may range from audio and video to images and text.
ï‚Ą

SmartConnector Technology accomplishes some of these tasks like crawlers, data
base connectors, screen scrapping utilities which are some of the technologies that
need to be deployed.

ï‚Ą

Similarity Analyser semantically clusters documents according to the various
relationships that a given document has with other documents.

ï‚Ą

Indian Language Search Engines.

ï‚Ą

Translingual Information Accessor for classified advertisements.
4. Powerful Visualisation
Efficient in technologies ranging from Flex to HTML5 and have developed User
Interfaces for different form factors from traditional web browsers to mobile
devices such as smart phones (Android, IOS etc) and tablets.
ï‚Ą Relationships with leading design firms based in USA to bring in expertise and
knowhow when required.
ï‚Ą

5. SNA
Named Entity and Event Resolution System is a hybrid system which works for
identifying 106 entity types with nested tags and has been tested with different
types of language data.
ï‚Ą Entity Relation Identification System is a statistical system which identifies
relation between two entities and the sentiments related to it.
ï‚Ą

6. User definitions
Aarktech has immense experience of and exposure to :
Designing and defining the architecture of Matrix Mapper on the lines of Analyst
Notebook.
ï‚Ą Domain knowledge and industry specific standards.
ï‚Ą
FEATURES OF THE MATRIX MAPPER PROJECT
ON THE LINES OF ANALYST’S NOTEBOOK /
SENTINEL VISUALIZER
The Matrix Mapper is meant to establish the interrelationships among hundreds of different people and
things that connect persons with persons via
communication devices (mobile, landline, satellite,
PTT/ SD Radios), credit/ debit cards, banking/
insurance transactions, email, clouds, rail/ road/
plane/ ship/ private transport, addresses, locations,
times, geo-spatial linkages, imagery, GIS and
numerous other means.
Analysts’ Notebook Image

Regardless of the language and platform in which data is available, the MM would be able
to perform cross platform analytics and convert very large volumes of data into graphics
and deploy semantic strengths for knowledge discovery leading to historical and predictive
matrices.
1. Images, icons, photographs and maps
can be swiftly dragged and dropped
onto vortex points illustrating
connections and relationships.
2. Mapping graphics resulting from
relationship analysis, identification
(text, images, audio, video) would
help identify the key elements in a
network after delineating the network
itself and its dimensions.
3. The MM would, using icons, images
and connectivity indicators, clearly
bring out the hierarchy, scaffolding
and functioning of the network firmly
and clearly.
ATM
Visit Time & Date

Date

Time

Date

Time

Date

Time

Shahdara

05/09/12

15: 35

04/11/12

15:55

03/01/13

16:00

Loni

25/09/12

16:00

24/11/12

15:30

23/01/13

16:10

Sarita Vihar

15/10/12

15:45

14/12/12

16:00

13/02/13

16:30

Prediction
Next ATM Withdrawal
The identification
of strategically
placed persons in
the network
including Key
Individuals,
Persons with
Influence,
Gatekeepers etc.
would be analyzed
alongside modus
operandi and
activity patterns as
the most effective
means of ensuring
result oriented
intelligence for
reactive or proactive measures.

Centrality

Between-ness

Closeness

Degree
EVENT
LINKAGE
IN Mm

Terror
Incidents
KBCRF
The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations
(www.svapas.com) and Serendio (www.serendio.com)
ecosystem brings in proven scientific and technical
skills, product development knowledge and
leadership to undertake the challenging enterprise.
The skill inventory includes development experience
with all modern programming and scripting languages,
various SQL and NOSQL database dialects, data warehousing, algorithms, data
structures, data science, user interface design and development with Flex, HTML,
HTML5. KBCRF follow test-driven development methodologies with continuous
integration, test and deployment.
Aarktech
1. Intelligence experience and user domain knowledge - Udayan Mukerji,
the Chief Mentor of Aarktech, has tremendous experience in intelligence
scenarios in India and across the globe. Udayan Mukerji retired from the
Indian Police Service more than three decades of service. During his career,
Udayan Mukerji functioned at various levels and garnered immense
experience as well as thoroughgoing expertise in areas dealing variously with
homeland security, the security of Indian Missions abroad, internal security,
communications security and investigations into security deficiencies. He is
the recipient of the prestigious Indian Police Medal for Meritorious Service
and the President's Medal for Distinguished Service.

2. Aarktech Team is professionally qualified with „IT Security‟ Industry
knowledge. The motivated team ensures best practices and standards of
product for ultimate customer satisfaction.
Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED).
SBMS is a highly secure and sophisticated Messaging Solution,
conceived and being developed successfully under the expert technical
competency of KBCRF and the participation of Aarktech.
Some of the distinctive features of SBMS :
















A user can login only from his workstation – this prevents somebody from
stealing the user ID, password and attempting to break in from some other location.
Operate with low latency on small bandwidths.
Release, distribution, security, and timely delivery of voice, video, data and messaging across
public and closed networks.
Robust LINUX platform at the server end, while interfacing with variety of OS like Windows,
Ubuntu, MAC etc.
Capability to function with Android phones, PDAs, hardened smart phone handsets and other
similar mobile devices.
Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are customized as
per client requirement.
Enhanced security and data integrity - Two factor authentication for logging on and encryption of
IP traffic using the customised SSO and SSL/ IPSec.
Asymmetric keys coupled with key pointers to ensure the most complete security possible.
Granular level of logs to enable forensic analysis of every activity that happens in messaging
application.
Contact Details:
Aarken Technologies Pvt Ltd.
C-12, Chirag Enclave,
New Delhi-110048.
Ph: 011 -26443221
Email: info@aarktech.net

Weitere Àhnliche Inhalte

Was ist angesagt?

Data Analysis Software
Data Analysis SoftwareData Analysis Software
Data Analysis SoftwareResearchLeap
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSISNisha Jain
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data AnalyticsRICHARD AMUOK
 
Smart Investigator Datasheet
Smart Investigator DatasheetSmart Investigator Datasheet
Smart Investigator DatasheetNextgen Software
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Bernhard Rieder
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingPayamBarnaghi
 
Insights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsInsights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsNeo4j
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOTijceronline
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining TechniqRespa Peter
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Adz91 Digital Ads Pvt Ltd
 

Was ist angesagt? (14)

Data Analysis Software
Data Analysis SoftwareData Analysis Software
Data Analysis Software
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
Smart Investigator Datasheet
Smart Investigator DatasheetSmart Investigator Datasheet
Smart Investigator Datasheet
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
 
Insights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsInsights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge Graphs
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOT
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining Techniq
 
Database
DatabaseDatabase
Database
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 

Ähnlich wie Matrix Mapper

Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.Linkurious
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningIRJET Journal
 
B040101007012
B040101007012B040101007012
B040101007012ijceronline
 
Apache Big D-2.docx
Apache Big D-2.docxApache Big D-2.docx
Apache Big D-2.docxazurev
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Linkurious
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefManish Kalra
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsRavi Teja
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecturerohitkhare
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...AI Publications
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementLinkurious
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfKarishma Chaudhary
 
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETSTOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETIRJET Journal
 
Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020Enterprise Knowledge
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureYehuda Korotkin
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsVrushaliSolanke
 
VisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNAVisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNAVisionet Systems, Inc.
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic WaveKaniska Mandal
 

Ähnlich wie Matrix Mapper (20)

Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep Learning
 
B040101007012
B040101007012B040101007012
B040101007012
 
Apache Big D-2.docx
Apache Big D-2.docxApache Big D-2.docx
Apache Big D-2.docx
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions Brief
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data Analytics
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecture
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETSTOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
 
Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020
 
Resume
ResumeResume
Resume
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data Analytics
 
VisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNAVisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNA
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic Wave
 

Mehr von aarkentechnologies

Matrix Mapper in Aviation Industry
Matrix Mapper in Aviation IndustryMatrix Mapper in Aviation Industry
Matrix Mapper in Aviation Industryaarkentechnologies
 
Matrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism UnitsMatrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism Unitsaarkentechnologies
 
SBMS in a VIP Security Environment
SBMS in a VIP Security EnvironmentSBMS in a VIP Security Environment
SBMS in a VIP Security Environmentaarkentechnologies
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environmentaarkentechnologies
 
SBMS for Global Oil Companies
SBMS for Global Oil CompaniesSBMS for Global Oil Companies
SBMS for Global Oil Companiesaarkentechnologies
 
SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management Systemaarkentechnologies
 

Mehr von aarkentechnologies (6)

Matrix Mapper in Aviation Industry
Matrix Mapper in Aviation IndustryMatrix Mapper in Aviation Industry
Matrix Mapper in Aviation Industry
 
Matrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism UnitsMatrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism Units
 
SBMS in a VIP Security Environment
SBMS in a VIP Security EnvironmentSBMS in a VIP Security Environment
SBMS in a VIP Security Environment
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environment
 
SBMS for Global Oil Companies
SBMS for Global Oil CompaniesSBMS for Global Oil Companies
SBMS for Global Oil Companies
 
SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management System
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

KĂŒrzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Matrix Mapper

  • 2.
  • 3.        Intelligent data gathering and dissemination. Managing huge amount of unstructured data. Easy data mining and structured analysis. Centralized database. Instant report generation. Efficient decision making. Pictorial depiction and pattern generation for better assimilation as also intelligent assessment, inference and extrapolation.
  • 4. The Matrix Mapper is intended to provide a strong, viable, dependable and effective alternative to the Analyst’s Notebook and to excel the Sentinel Visualizer. Therefore, for clarity in concept & visualization, some images of Analyst’s Notebook have been used.
  • 5. Manufacturer – i2 IBM Export Control Regulation - Only available to businesses, government agencies and academic institutions operating within the USA and Russia
  • 7. ANALYST’S NOTEBOOK SENTINEL VISUALIZER It is a visual intelligence analysis environment that enables to quickly collate, analyze and visualize data from disparate sources. Is a Windows based application written in Visual Studio .NET supporting an MSDE/SQL Server database. It can connect to a shared server in the office or run on your local database when you are in the field. It centralizes data from multiple sources. Supports an unlimited number of databases. The platform provides a flexible data-centric model optimized for multidimensional data analysis, which is a key requirement for collaborative working environments. Increased understanding of the structure, hierarchy, and method of operation of criminal, terrorist and fraudulent networks. Data visualization in 2D. Data visualization capabilities including 2D and 3D link charts and stereoscopic graphs. Social Network Analysis (SNA) and quantitative analysis techniques that combine organization theories with mathematical models to help better understand and target the dynamics of groups, networks, and organizations. Built-in Social Network Analysis and Advanced Network Analysis.
  • 8. ANALYST’S NOTEBOOK SENTINEL VISUALIZER Searching unstructured data using powerful search capabilities to cast the net wide and deep to ensure that no data is missed in supporting investigative and operational activities. Name disambiguation through aliases and fuzzy searching. It requires you to install a hardware dongle in order to start the program. No hardware dongle required. Entities in Analyst's Notebook are shown with a builtin graphic by type (e.g. people). Each entity in Sentinel Visualizer can have its own picture that is displayed directly on your link chart to let you better understand your data. In Analyst's Notebook, every relationship and line is the same. However the intensity and incidence of relationships is clearly delineated. Different types of links should be weighted differently (e.g. a brother relationship is very different from two people who attended a meeting). This is, however, not possible in very complex cases with multiple nodes. Timelines are integral to the defining of incidence and relationships. Sentinel Visualizer does Temporal Analysis. If your relationships have information with start and/or end times, they can be automatically plotted on a timeline. This lets you quickly see when events occur and for how long.
  • 9.
  • 10. Timeline analysis depicts events as they unfold over time, allowing to understand cause and effect, identify patterns, and decide upon appropriate courses of action. Entities can be tracked over time, to identify their associations with an event or incident. Transaction pattern analysis enables display of a series of transactions in chronological order. This helps to reveal repetitions in patterns of activity and can help to predict future behavior. Based on its huge data base, Analyst’s Notebook has the capability to predict the next event (Probability): ï‚š Locations ï‚š Persons involved ï‚š Time ï‚š Date
  • 11. CAPABILITIES/EXPERTISE OF AARKTECH AND THEIR DEVELOPMENT ASSOCIATES, KBCRF, IN REGARD TO THE :
  • 12. 1. SemantiCS KBCRF has tremendous exposure and core competency in the field of Semantics. ï‚Ą Intellectual Property in Computational tools and resources for Indian Languages, like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel Corpora, etc. ï‚Ą Text Analytics Platform - is a multilingual semantic analysis platform which can take any unstructured data (web data, social network data, blogs etc) as input and analyse and bring it to a structured database for further analysis. 2. Big Data Analytics KBCRF has proven capability to work with Big-Data and Text Analytics. MM‟s requirement for vast data gathering and complex event processing mandates a platform that can handle “Big Data”. ï‚Ą Activity Analysis and Fraud Analytics product lines include a Big Data Platform based on Hadoop that includes workflow, traditional relational databases as well as non-relational (NOSQL) databases. ï‚Ą Information Extraction System extracts information from unstructured text from various domains for information pertinent to the user which can be defined according to the user requirement.
  • 13. 3. Knowledge Discovery ï‚Ą A product like MM depends critically on large scale acquisition of data from multiple sources: Internal and external sources, open sources and social media.  Sources could be structured (credit card transactions, hotel occupancy records etc) and unstructured (textual case narratives, open sources from the internet etc).  The media may range from audio and video to images and text. ï‚Ą SmartConnector Technology accomplishes some of these tasks like crawlers, data base connectors, screen scrapping utilities which are some of the technologies that need to be deployed. ï‚Ą Similarity Analyser semantically clusters documents according to the various relationships that a given document has with other documents. ï‚Ą Indian Language Search Engines. ï‚Ą Translingual Information Accessor for classified advertisements.
  • 14. 4. Powerful Visualisation Efficient in technologies ranging from Flex to HTML5 and have developed User Interfaces for different form factors from traditional web browsers to mobile devices such as smart phones (Android, IOS etc) and tablets. ï‚Ą Relationships with leading design firms based in USA to bring in expertise and knowhow when required. ï‚Ą 5. SNA Named Entity and Event Resolution System is a hybrid system which works for identifying 106 entity types with nested tags and has been tested with different types of language data. ï‚Ą Entity Relation Identification System is a statistical system which identifies relation between two entities and the sentiments related to it. ï‚Ą 6. User definitions Aarktech has immense experience of and exposure to : Designing and defining the architecture of Matrix Mapper on the lines of Analyst Notebook. ï‚Ą Domain knowledge and industry specific standards. ï‚Ą
  • 15. FEATURES OF THE MATRIX MAPPER PROJECT ON THE LINES OF ANALYST’S NOTEBOOK / SENTINEL VISUALIZER
  • 16. The Matrix Mapper is meant to establish the interrelationships among hundreds of different people and things that connect persons with persons via communication devices (mobile, landline, satellite, PTT/ SD Radios), credit/ debit cards, banking/ insurance transactions, email, clouds, rail/ road/ plane/ ship/ private transport, addresses, locations, times, geo-spatial linkages, imagery, GIS and numerous other means.
  • 17. Analysts’ Notebook Image Regardless of the language and platform in which data is available, the MM would be able to perform cross platform analytics and convert very large volumes of data into graphics and deploy semantic strengths for knowledge discovery leading to historical and predictive matrices.
  • 18. 1. Images, icons, photographs and maps can be swiftly dragged and dropped onto vortex points illustrating connections and relationships. 2. Mapping graphics resulting from relationship analysis, identification (text, images, audio, video) would help identify the key elements in a network after delineating the network itself and its dimensions. 3. The MM would, using icons, images and connectivity indicators, clearly bring out the hierarchy, scaffolding and functioning of the network firmly and clearly.
  • 19. ATM Visit Time & Date Date Time Date Time Date Time Shahdara 05/09/12 15: 35 04/11/12 15:55 03/01/13 16:00 Loni 25/09/12 16:00 24/11/12 15:30 23/01/13 16:10 Sarita Vihar 15/10/12 15:45 14/12/12 16:00 13/02/13 16:30 Prediction Next ATM Withdrawal
  • 20. The identification of strategically placed persons in the network including Key Individuals, Persons with Influence, Gatekeepers etc. would be analyzed alongside modus operandi and activity patterns as the most effective means of ensuring result oriented intelligence for reactive or proactive measures. Centrality Between-ness Closeness Degree
  • 22.
  • 23. KBCRF The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations (www.svapas.com) and Serendio (www.serendio.com) ecosystem brings in proven scientific and technical skills, product development knowledge and leadership to undertake the challenging enterprise. The skill inventory includes development experience with all modern programming and scripting languages, various SQL and NOSQL database dialects, data warehousing, algorithms, data structures, data science, user interface design and development with Flex, HTML, HTML5. KBCRF follow test-driven development methodologies with continuous integration, test and deployment.
  • 24. Aarktech 1. Intelligence experience and user domain knowledge - Udayan Mukerji, the Chief Mentor of Aarktech, has tremendous experience in intelligence scenarios in India and across the globe. Udayan Mukerji retired from the Indian Police Service more than three decades of service. During his career, Udayan Mukerji functioned at various levels and garnered immense experience as well as thoroughgoing expertise in areas dealing variously with homeland security, the security of Indian Missions abroad, internal security, communications security and investigations into security deficiencies. He is the recipient of the prestigious Indian Police Medal for Meritorious Service and the President's Medal for Distinguished Service. 2. Aarktech Team is professionally qualified with „IT Security‟ Industry knowledge. The motivated team ensures best practices and standards of product for ultimate customer satisfaction.
  • 25. Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED). SBMS is a highly secure and sophisticated Messaging Solution, conceived and being developed successfully under the expert technical competency of KBCRF and the participation of Aarktech. Some of the distinctive features of SBMS :          A user can login only from his workstation – this prevents somebody from stealing the user ID, password and attempting to break in from some other location. Operate with low latency on small bandwidths. Release, distribution, security, and timely delivery of voice, video, data and messaging across public and closed networks. Robust LINUX platform at the server end, while interfacing with variety of OS like Windows, Ubuntu, MAC etc. Capability to function with Android phones, PDAs, hardened smart phone handsets and other similar mobile devices. Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are customized as per client requirement. Enhanced security and data integrity - Two factor authentication for logging on and encryption of IP traffic using the customised SSO and SSL/ IPSec. Asymmetric keys coupled with key pointers to ensure the most complete security possible. Granular level of logs to enable forensic analysis of every activity that happens in messaging application.
  • 26. Contact Details: Aarken Technologies Pvt Ltd. C-12, Chirag Enclave, New Delhi-110048. Ph: 011 -26443221 Email: info@aarktech.net

Hinweis der Redaktion

  1. Please go through the features of the Analysts’ Notebook once more, carefully. Let us not omit anything critical which can be later viewed as deliberate and/ or tending to inaccuracies.