Matrix Mapper
Upcoming SlideShare
Loading in...5
×
 

Matrix Mapper

on

  • 353 views

The Matrix Mapper (MM) - This is a product for which the Aarktech - KBCRF consortium is looking for any of several options to develop the product that would mirror the capabilities of the Analysts' ...

The Matrix Mapper (MM) - This is a product for which the Aarktech - KBCRF consortium is looking for any of several options to develop the product that would mirror the capabilities of the Analysts' Notebook (AN), an application created by i2, an IBM subsidiary, which cannot be sold anywhere outside the US and Russia and is subject to stringent US Export Control (EC) regulations.
The AN is the most sought after (but not readily available) tool, worldwide, by global businesses as also the crime fighting, counter terrorist, counter insurgency and financial intelligence agencies of numerous countries. It has the capability to integrate mountains of text, video, audio, graphic and image data and to employ Big Data Analytics, Semantics, Social Network Analysis (SNA) and Knowledge Discovery methods to delineate the existence, incidence, pattern and correlation of linkages in order to throw up actionable and predictive results.
The tsunami of data being generated globally threatens to submerge and seriously impair the interests of government agencies as well businesses worldwide unless powerful tools are available to intelligently comprehend diverse data types like alpha-numeric, voice, video and graphic; analyse these tidal waves of data; decipher patterns as well as connections and arrive at inferences and conclusions that provide a firm basis for next steps be they brick and mortar or in cyber space.
Matrix Mapper would serve as the ultimate tool for very large scale, cross platform, data collation, mining, comprehension, analysis, networking/ pattern identification and prediction/ direction determination using knowledge discovery methods. The Matrix Mapper would, thus, prove indispensable to businesses in sectors as diverse as mining, oil & gas, power (generation & distribution), airlines, land and water transport, shipping, chain stores, agriculture/ food distribution, warehousing, courier concerns, accounting, banking and insurance. Government agencies/ departments which would find Matrix Mapper to be a kind of force multiplier include the defence forces, police, forest conservation, counter terrorism units, municipalities, railways and a variety of Public Sector Undertakings.

Statistics

Views

Total Views
353
Views on SlideShare
226
Embed Views
127

Actions

Likes
0
Downloads
2
Comments
0

2 Embeds 127

http://www.scoop.it 120
http://www.aarktech.net 7

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Please go through the features of the Analysts’ Notebook once more, carefully. Let us not omit anything critical which can be later viewed as deliberate and/ or tending to inaccuracies.

Matrix Mapper Matrix Mapper Presentation Transcript

  • Project Matrix Mapper
  •        Intelligent data gathering and dissemination. Managing huge amount of unstructured data. Easy data mining and structured analysis. Centralized database. Instant report generation. Efficient decision making. Pictorial depiction and pattern generation for better assimilation as also intelligent assessment, inference and extrapolation.
  • The Matrix Mapper is intended to provide a strong, viable, dependable and effective alternative to the Analyst’s Notebook and to excel the Sentinel Visualizer. Therefore, for clarity in concept & visualization, some images of Analyst’s Notebook have been used.
  • Manufacturer – i2 IBM Export Control Regulation - Only available to businesses, government agencies and academic institutions operating within the USA and Russia
  • COMPETITION VIS-A-VIS ANALYST‟S NOTEBOOK
  • ANALYST’S NOTEBOOK SENTINEL VISUALIZER It is a visual intelligence analysis environment that enables to quickly collate, analyze and visualize data from disparate sources. Is a Windows based application written in Visual Studio .NET supporting an MSDE/SQL Server database. It can connect to a shared server in the office or run on your local database when you are in the field. It centralizes data from multiple sources. Supports an unlimited number of databases. The platform provides a flexible data-centric model optimized for multidimensional data analysis, which is a key requirement for collaborative working environments. Increased understanding of the structure, hierarchy, and method of operation of criminal, terrorist and fraudulent networks. Data visualization in 2D. Data visualization capabilities including 2D and 3D link charts and stereoscopic graphs. Social Network Analysis (SNA) and quantitative analysis techniques that combine organization theories with mathematical models to help better understand and target the dynamics of groups, networks, and organizations. Built-in Social Network Analysis and Advanced Network Analysis.
  • ANALYST’S NOTEBOOK SENTINEL VISUALIZER Searching unstructured data using powerful search capabilities to cast the net wide and deep to ensure that no data is missed in supporting investigative and operational activities. Name disambiguation through aliases and fuzzy searching. It requires you to install a hardware dongle in order to start the program. No hardware dongle required. Entities in Analyst's Notebook are shown with a builtin graphic by type (e.g. people). Each entity in Sentinel Visualizer can have its own picture that is displayed directly on your link chart to let you better understand your data. In Analyst's Notebook, every relationship and line is the same. However the intensity and incidence of relationships is clearly delineated. Different types of links should be weighted differently (e.g. a brother relationship is very different from two people who attended a meeting). This is, however, not possible in very complex cases with multiple nodes. Timelines are integral to the defining of incidence and relationships. Sentinel Visualizer does Temporal Analysis. If your relationships have information with start and/or end times, they can be automatically plotted on a timeline. This lets you quickly see when events occur and for how long.
  • Timeline analysis depicts events as they unfold over time, allowing to understand cause and effect, identify patterns, and decide upon appropriate courses of action. Entities can be tracked over time, to identify their associations with an event or incident. Transaction pattern analysis enables display of a series of transactions in chronological order. This helps to reveal repetitions in patterns of activity and can help to predict future behavior. Based on its huge data base, Analyst’s Notebook has the capability to predict the next event (Probability):  Locations  Persons involved  Time  Date
  • CAPABILITIES/EXPERTISE OF AARKTECH AND THEIR DEVELOPMENT ASSOCIATES, KBCRF, IN REGARD TO THE :
  • 1. SemantiCS KBCRF has tremendous exposure and core competency in the field of Semantics.  Intellectual Property in Computational tools and resources for Indian Languages, like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel Corpora, etc.  Text Analytics Platform - is a multilingual semantic analysis platform which can take any unstructured data (web data, social network data, blogs etc) as input and analyse and bring it to a structured database for further analysis. 2. Big Data Analytics KBCRF has proven capability to work with Big-Data and Text Analytics. MM‟s requirement for vast data gathering and complex event processing mandates a platform that can handle “Big Data”.  Activity Analysis and Fraud Analytics product lines include a Big Data Platform based on Hadoop that includes workflow, traditional relational databases as well as non-relational (NOSQL) databases.  Information Extraction System extracts information from unstructured text from various domains for information pertinent to the user which can be defined according to the user requirement.
  • 3. Knowledge Discovery  A product like MM depends critically on large scale acquisition of data from multiple sources: Internal and external sources, open sources and social media.  Sources could be structured (credit card transactions, hotel occupancy records etc) and unstructured (textual case narratives, open sources from the internet etc).  The media may range from audio and video to images and text.  SmartConnector Technology accomplishes some of these tasks like crawlers, data base connectors, screen scrapping utilities which are some of the technologies that need to be deployed.  Similarity Analyser semantically clusters documents according to the various relationships that a given document has with other documents.  Indian Language Search Engines.  Translingual Information Accessor for classified advertisements.
  • 4. Powerful Visualisation Efficient in technologies ranging from Flex to HTML5 and have developed User Interfaces for different form factors from traditional web browsers to mobile devices such as smart phones (Android, IOS etc) and tablets.  Relationships with leading design firms based in USA to bring in expertise and knowhow when required.  5. SNA Named Entity and Event Resolution System is a hybrid system which works for identifying 106 entity types with nested tags and has been tested with different types of language data.  Entity Relation Identification System is a statistical system which identifies relation between two entities and the sentiments related to it.  6. User definitions Aarktech has immense experience of and exposure to : Designing and defining the architecture of Matrix Mapper on the lines of Analyst Notebook.  Domain knowledge and industry specific standards. 
  • FEATURES OF THE MATRIX MAPPER PROJECT ON THE LINES OF ANALYST’S NOTEBOOK / SENTINEL VISUALIZER
  • The Matrix Mapper is meant to establish the interrelationships among hundreds of different people and things that connect persons with persons via communication devices (mobile, landline, satellite, PTT/ SD Radios), credit/ debit cards, banking/ insurance transactions, email, clouds, rail/ road/ plane/ ship/ private transport, addresses, locations, times, geo-spatial linkages, imagery, GIS and numerous other means.
  • Analysts’ Notebook Image Regardless of the language and platform in which data is available, the MM would be able to perform cross platform analytics and convert very large volumes of data into graphics and deploy semantic strengths for knowledge discovery leading to historical and predictive matrices.
  • 1. Images, icons, photographs and maps can be swiftly dragged and dropped onto vortex points illustrating connections and relationships. 2. Mapping graphics resulting from relationship analysis, identification (text, images, audio, video) would help identify the key elements in a network after delineating the network itself and its dimensions. 3. The MM would, using icons, images and connectivity indicators, clearly bring out the hierarchy, scaffolding and functioning of the network firmly and clearly.
  • ATM Visit Time & Date Date Time Date Time Date Time Shahdara 05/09/12 15: 35 04/11/12 15:55 03/01/13 16:00 Loni 25/09/12 16:00 24/11/12 15:30 23/01/13 16:10 Sarita Vihar 15/10/12 15:45 14/12/12 16:00 13/02/13 16:30 Prediction Next ATM Withdrawal
  • The identification of strategically placed persons in the network including Key Individuals, Persons with Influence, Gatekeepers etc. would be analyzed alongside modus operandi and activity patterns as the most effective means of ensuring result oriented intelligence for reactive or proactive measures. Centrality Between-ness Closeness Degree
  • EVENT LINKAGE IN Mm Terror Incidents
  • KBCRF The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations (www.svapas.com) and Serendio (www.serendio.com) ecosystem brings in proven scientific and technical skills, product development knowledge and leadership to undertake the challenging enterprise. The skill inventory includes development experience with all modern programming and scripting languages, various SQL and NOSQL database dialects, data warehousing, algorithms, data structures, data science, user interface design and development with Flex, HTML, HTML5. KBCRF follow test-driven development methodologies with continuous integration, test and deployment.
  • Aarktech 1. Intelligence experience and user domain knowledge - Udayan Mukerji, the Chief Mentor of Aarktech, has tremendous experience in intelligence scenarios in India and across the globe. Udayan Mukerji retired from the Indian Police Service more than three decades of service. During his career, Udayan Mukerji functioned at various levels and garnered immense experience as well as thoroughgoing expertise in areas dealing variously with homeland security, the security of Indian Missions abroad, internal security, communications security and investigations into security deficiencies. He is the recipient of the prestigious Indian Police Medal for Meritorious Service and the President's Medal for Distinguished Service. 2. Aarktech Team is professionally qualified with „IT Security‟ Industry knowledge. The motivated team ensures best practices and standards of product for ultimate customer satisfaction.
  • Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED). SBMS is a highly secure and sophisticated Messaging Solution, conceived and being developed successfully under the expert technical competency of KBCRF and the participation of Aarktech. Some of the distinctive features of SBMS :          A user can login only from his workstation – this prevents somebody from stealing the user ID, password and attempting to break in from some other location. Operate with low latency on small bandwidths. Release, distribution, security, and timely delivery of voice, video, data and messaging across public and closed networks. Robust LINUX platform at the server end, while interfacing with variety of OS like Windows, Ubuntu, MAC etc. Capability to function with Android phones, PDAs, hardened smart phone handsets and other similar mobile devices. Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are customized as per client requirement. Enhanced security and data integrity - Two factor authentication for logging on and encryption of IP traffic using the customised SSO and SSL/ IPSec. Asymmetric keys coupled with key pointers to ensure the most complete security possible. Granular level of logs to enable forensic analysis of every activity that happens in messaging application.
  • Contact Details: Aarken Technologies Pvt Ltd. C-12, Chirag Enclave, New Delhi-110048. Ph: 011 -26443221 Email: info@aarktech.net