SlideShare a Scribd company logo
1 of 54
[object Object],[object Object],[object Object],Ashish Sonal CEO,  Orkash Services Pvt Ltd
About Orkash ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Part -1   Indian Security  Scenario Overview Part -2 Automating Intelligence creation   -  Intelligence creation - Correlating the 'concept of operations'  Part-3  Tackling unconventional conflicts in India -  UCIMS
The previous wave .. Date of attack Location (Scope of the attack) LEGEND KEY 21 October  2008 Imphal, Manipur (One device) 13 May 2008 Jaipur, Rajasthan (Eight devices) 25 July  2008 Bengaluru, Karnataka (Eight Devices) 26 July  2008 Ahmedabad, Gujarat (21 devices) 29-30 July  2008 Surat, Gujarat (18 devices) 13 September  2008 New Delhi (Six devices) 29 September  2008 Modasa, Gujarat (One device) 29 September  2008 Malegaon, Maharashtra (Two devices) 01 October  2008 Tripura, Agartala (Five devices) 30 October  2008 Guwahati, Assam (18 devices) 26-29 November  2008 Mumbai, Maharashtra (Multiple Attacks & Blasts) 27 September 2008 New Delhi (One device) 01January 2008 Rampur, U.P (Two devices)
Major Naxalites Areas
Circa 2010: Transition Patterns - Naxalism Discontent among the 'strategic' arm of Naxals differences between groups supporting armed struggle and other, ready for negotiations Military arm of Naxals becoming aggressive Religion and caste becoming an issues Leveraging the political forces Ambiguous leadership Discontent among members Clash in recruitment and funding sources Naxalism in  Transition Naxal Organization Indian government actions and 'reactions' Absence of constructive and 'crowd pulling' ideology
Transition of terrorism in India (post 26/11) Transition of terrorism in India (post 26/11) Organised Crime Linkages (local & international) Meticulous operational and strategic  planning Recruitment is becoming local  focusing on  those working in factories and computer literates from big cities Emergence of India as a target of  transnational terrorism Expanding logistical homebase Still 'waiting' to carry out mass large scale  attacks Impacted by neighborhood Geo-strategic forces
Information Asymmetry - Mining for real time intelligence ,[object Object],[object Object],[object Object],Historical data analysis would train expert engines to raise triggers and red flags. Real time data mining will generate trends and patterns in the usage Multiple Sims Multiple Handsets Internet account Account: Hazi Al Password: Hazi_123 Location [email_address] [email_address] [email_address] IP address MAC address Metadata Email tracing Telephone Banking and Card Usage
Challenges for the security forces  Terrain & Demographic Information Intelligence collation from diverse sources Network  centric operations & comd & control Technology Platforms Evolution of  Organized crime Development of the Concept of Operations Strategic Challenges
Challenges for the security forces (Intelligence & Ops) Information availability in multi agency envt Leveraging on predictive patterns Managing short term and long term op activities Planning and  monitoring Information asymmetry Command and Control The single largest challenge is the creation of actionable intelligence for actual op execution
The Intelligence Stack Strategic Intelligence Operational Intelligence Tactical Intelligence Tactical  Intelligence Operational  Intelligence Strategic Intelligence Intelligence Consumption Intelligence Creation
Technical Intelligence  + Human Intelligence Predictive and Investigative Intelligence Intelligence Needs Granularity - Data Cubes WHY WHAT WHERE WHO WHEN
Convergence – Human Int and Tech Int Intelligence Agencies - Databases Administrative - Databases Tech Intelligence Datamining Processing  Raw Data  into  Usable  form Better Information  Collection Internet based information collection  and investigation (Track Back) Enhanced  Prevent-Prepare-Respond-Recover Structure  Identifying Triggers & Patterns Automated analysis of structured & unstructured data Human Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
The FOUR Pillars of Automated Intelligence Creation  Information  Extraction and Monitoring Semantic  Analysis Geospatial  Analysis Data Mining & Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Use of semantics to decipher the  content Unstructured to structured data  Using domain  specific ontologies Network analysis Tools  and analytics Analysis of the geospatial context and  better data visualization Geospatial  intelligence for  effective decision making Location intelligence for  better interpretation of networks & activities  Data Mining on real time basis Analysis of trends and patterns of activities Internet & Cyber Forensics  Target Centric Social Network Analysis Pattern Tracing and  Tracking
Automating Intelligence Creation  - The Process Layers  © 2010 - Orkash Services Pvt. Ltd . Information  generation/extraction Semantic  analysis Geospatial  analysis Leverage ‘ collective int’ ,[object Object],[object Object],[object Object],[object Object],[object Object],Data mining
Target Centric Intelligence Model
Unconventional Conflict & Intelligence Management System (UCIMS)
Intelligence collaboration process Intelligence sources Socio political  events Demographics Sat images, maps Technical inputs Data repository - Raw data - Analysis of data - Intelligence creation - Intelligence distribution Actionable intelligence Tactical decision making Intelligence collaboration process
Semantic Enrichment ,[object Object],[object Object],[object Object],[object Object],(XML) D1 D2 D3 . . Dn Document  Classification Classification  Results Commonsense Engine Concepts Engine Concepts Tagged  Documents + Entities Semantic Enrichment Semantically Enriched Documents Documents
 
 
Combining Data Mining and  Link Analysis
Inferenced Information Representation
Deeper relations between entities
Association between events
Network Analysis and Data visualization  (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis  (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Manual Graphics-based Manual Structured
Past historical factual information
Visualizing Semantic Data Analysis in GIS Context ,[object Object],[object Object],[object Object],[object Object]
OLAP analysis
Naxal Emerging Fault lines Castes and tribes Within tribes Inter-state  leadership CPI (Maoist)   and  frontal organizations Splinter groups The direction these splits take as the government action on all fronts intensifies will have a major bearing on the future of Naxal movement and strategy in India Naxal Movement
Interaction with socio-political environment ,[object Object]
‘ GO’ Areas—Risk Profiles  (Case Study) Durg Kanker  East Baster  East ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],8% 8% 5% 5% 15% 16% 13% 11% 6% 13% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 9% 6% 6% 7% 17% 16% 11% 9% 4% 15% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 11% 8% 4% 6% 13% 11% 15% 8% 7% 17% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments
‘ Borderline Go’ Areas—Risk Profiles  (Case Study) Dantewada  Central Kanker  West Baster  West ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16% 10% 18% 10% 8% 11% 8% 2% 5% 12% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 15% 11% 17% 6% 13% 10% 9% 4% 2% 13% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 14% 10% 15% 9% 11% 10% 11% 5% 3% 12% Extremism Crime Geoography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments
‘ NO GO’ Areas—Risk Profiles  (Case Study) Dantewada  West Dantewada  East ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basis for Risk Mitigation  -  (Case Study) Low Risks  They do not require the formulation of a risk mitigation strategy at this stage of exploration work Moderate Risks  Awareness about factors and influences that drive these parameters, and regular monitoring are required. The threats from these risks however will not have a direct impact at this stage Extreme & High Risks  Those areas that register a 15+ total on freq * severity require active risk mitigations strategies to be in place
Sample KRI Parameters & Triggers for Risk Intelligence Framework  (a large mining project in India)  -  (Case Study)   Common Borders   Topography   Forest Cover that  indicates Naxalite  hideout zones   Rivers — that could  potentially lead to  crime and water  politics in the  future. Seasonal  floods, as well as  shortage of  irrigation water in  certain seasons  lead to incidents  of violence, crime  and clashes  amongst villagers    Location of a  particular  district   Population   Incidents in the  district   Nature of  criminal groups   State of police  and governance   Presence of  Naxalism (The  number,  strength and  method indicate  the pos sibility  of Naxalite  Attacks)   Ammunition  recovery and  Arrests within a  district (Reflects  the strength of  the network) Crime/Extremism Geography Local Political Situation   Constituency  representative   Opposition parties   Influence of  Naxalite political  groups   Local support for  Naxalites/ political  party A constituency with high profile candidates  and major political  parties attract Naxalite  attacks and the crime  - politics connection Socio - Economic   Economic  Profile   Literacy   Occupation   Youth — education and  employment   Percentage of  SC/ST * in total  population -- A high risk socio - economic profile can  provide flashpoints  for the future -- The youth form a  substant ial part of  the “new criminals” * SC/ST  – Scheduled Cast e s  / Scheduled Tribes Land Politics   Type of Land    Yield   Size of holdings   Land Clashes Caste - based attacks  and crimes result in  human loss and  psyc hological fear in  an area Road + Rail   Presence of  NH/SH in the  district   Condition of  roads and rail  network   I ncidents on  both   Accidents   Closest railway  stations and  alternative  ways of access Infrastructure   Hospitals   Banks   Electricity/Power  sup ply   Telecom Circle   Water Local Sentiment   Attitude  towards  foreigners   Attitude  towards Mining   Protests   Mobilizers — NGOs, Pradhans   L ocal media Businesses   No .  of  Businesses in  the area   Year of start  and closure   Nature of  Business   Ratio of  Businesses  closed to open Natural Hazard   Earthquakes   Floods   Monsoon    Drought
Risk Visualization / Risk Map – Mining Project -  (Case Study) Disruptions Methods of Stalling High Risk Medium Risk Low Risk R I S K I N T E L L I G E N C E Vulnerabilities Associated with  Legal,   Regulatory,  &  Policy  Issues Demonstrations, Strikes Security/Loss/ Sabotage Instruments which can make this happen Extremism/ Crime Political Dynamics People’s Right Activists Local Social & Community Issues  Local Contracts Resettlements Pollution Environment Local Employment Socio - Economic Reasons
ORKASH-UCIMS on a geospatial platform
 
Intelligence & Operations Management
Connecting the Dots..
Location Intelligence
Tracking events news with location based search
Advanced Search Techniques for Location Intelligence
 
Monitoring Movement of Tactical Assets
Air Surveillance
UCIMS Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Centric Command and Control System ,[object Object],Network diverse entities Allow information Sharing Enhance Situational Awareness Enable - C4I Increase mission effectiveness
THANK YOU Orkash Services Pvt Ltd 75 C, Sector 18 Gurgaon 122 015 Haryana, India Phone: +91 124 4033773 +91 98102 36020 [email_address] .com www.orkash.com
Impetus on intelligence creation - why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing security landscape of India  India has experienced  a continued  and an  almost  consistent  security problem  pertaining to: -Naxalism  - Insurgency -Extremism -Organized  crime Drivers of  Transition: -Operational  Sophistication -Ideological  Evolution India's internal  security  scenario  is in a very  'delicate'  and a  'vulnerable'  stage Unconventional conflicts and deteriorating security mechanisms have forced us to think beyond the routine 'guard and police' protection Essentially non existent, it is high time that India focuses on homeland security protection Long history  of terrorism Terrorism Transition Internal Security Security Evolution Homeland Security
Homeland security in India  Increased focus on HLS post 26/11 Fragmented structure of HLS sector  Technology  Modernization New Technology  Introduction Information Synthesis
Intelligence Challenges  and  Connecting the Dots.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2010 - Orkash Services Pvt.  Ltd. … ensuring Assurance in complexity and uncertainty

More Related Content

What's hot

A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsNeo4j
 
Information Technology Data Mining
Information Technology Data MiningInformation Technology Data Mining
Information Technology Data Miningsamiksha sharma
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Bernhard Rieder
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformSean Ben
 
Open data for smart cities
Open data for smart citiesOpen data for smart cities
Open data for smart citiesSören Auer
 
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...IT Network marcus evans
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityLouise Spiteri
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalyticsDaniel John
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Gagan Bansal
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIIJCSEA Journal
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)Sonu Gupta
 
Use of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisUse of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisIRC
 

What's hot (19)

A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Data mining
Data mining Data mining
Data mining
 
Data Mining
Data MiningData Mining
Data Mining
 
Data Mining
Data MiningData Mining
Data Mining
 
Information Technology Data Mining
Information Technology Data MiningInformation Technology Data Mining
Information Technology Data Mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Dwdm
DwdmDwdm
Dwdm
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Open data for smart cities
Open data for smart citiesOpen data for smart cities
Open data for smart cities
 
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
 
Big data Paper
Big data PaperBig data Paper
Big data Paper
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
 
Use of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisUse of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysis
 

Viewers also liked

Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersDenys A. Flores, PhD
 
Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out IPPAI
 
Mats almqwist
Mats almqwistMats almqwist
Mats almqwistIPPAI
 
Адміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянинуАдміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянинуCentre of Policy and Legal Reform
 
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссеЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссеПавел Долинин
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationVarun D R
 
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6Sabin Buraga
 

Viewers also liked (10)

Periodismo Deportivo
Periodismo Deportivo Periodismo Deportivo
Periodismo Deportivo
 
Planning A Group Outing
Planning A Group OutingPlanning A Group Outing
Planning A Group Outing
 
Design Process
Design ProcessDesign Process
Design Process
 
Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
 
Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out
 
Mats almqwist
Mats almqwistMats almqwist
Mats almqwist
 
Адміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянинуАдміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянину
 
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссеЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint Presentation
 
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
 

Similar to Ashish sonal_banglore

Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbaiIPPAI
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonalIPPAI
 
Mandeep mann
Mandeep mannMandeep mann
Mandeep mannIPPAI
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...Alexander Decker
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39Alexander Decker
 
KIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfKIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfDr. Radhey Shyam
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataIAEME Publication
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfDr. Radhey Shyam
 
Applications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayApplications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayAmit Sheth
 
Data Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat YazıcıData Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat YazıcıMurat YAZICI, M.Sc.
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureYehuda Korotkin
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsVrushaliSolanke
 
A COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MININGA COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MININGArlene Smith
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentIJERA Editor
 
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data DisseminationWorkshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data DisseminationZoltan Nagy
 
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...OW2
 
How new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finalHow new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finaljcscholtes
 

Similar to Ashish sonal_banglore (20)

Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbai
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonal
 
Mandeep mann
Mandeep mannMandeep mann
Mandeep mann
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39
 
KIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfKIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdf
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Data Science
Data ScienceData Science
Data Science
 
Applications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayApplications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World Today
 
Data Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat YazıcıData Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat Yazıcı
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
IAASB & Disruptive Technologies
IAASB & Disruptive TechnologiesIAASB & Disruptive Technologies
IAASB & Disruptive Technologies
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data Analytics
 
A COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MININGA COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MINING
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data Environment
 
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data DisseminationWorkshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
 
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
 
How new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finalHow new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-final
 

More from IPPAI

The Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve KearnsThe Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve KearnsIPPAI
 
Standards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael MulquinStandards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael MulquinIPPAI
 
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar PillaiIPPAI
 
Smart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den BergSmart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den BergIPPAI
 
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...IPPAI
 
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor GibsonSmart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor GibsonIPPAI
 
Industry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik VigIndustry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik VigIPPAI
 
Future cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy MulliganFuture cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy MulliganIPPAI
 
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken DragoonCan the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken DragoonIPPAI
 
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt PattanaikSmart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt PattanaikIPPAI
 
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...IPPAI
 
The Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet MistryThe Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet MistryIPPAI
 
From Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard SchombergFrom Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard SchombergIPPAI
 
INAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry DhaulINAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry DhaulIPPAI
 
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...IPPAI
 
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James DunningSmart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James DunningIPPAI
 
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...IPPAI
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...IPPAI
 
Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...IPPAI
 
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum ParwezSmart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum ParwezIPPAI
 

More from IPPAI (20)

The Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve KearnsThe Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve Kearns
 
Standards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael MulquinStandards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael Mulquin
 
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
 
Smart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den BergSmart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den Berg
 
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
 
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor GibsonSmart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
 
Industry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik VigIndustry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik Vig
 
Future cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy MulliganFuture cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy Mulligan
 
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken DragoonCan the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
 
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt PattanaikSmart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
 
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
 
The Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet MistryThe Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet Mistry
 
From Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard SchombergFrom Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard Schomberg
 
INAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry DhaulINAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry Dhaul
 
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
 
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James DunningSmart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
 
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
 
Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...
 
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum ParwezSmart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Ashish sonal_banglore

  • 1.
  • 2.
  • 3. Agenda Part -1 Indian Security Scenario Overview Part -2 Automating Intelligence creation - Intelligence creation - Correlating the 'concept of operations' Part-3 Tackling unconventional conflicts in India - UCIMS
  • 4. The previous wave .. Date of attack Location (Scope of the attack) LEGEND KEY 21 October 2008 Imphal, Manipur (One device) 13 May 2008 Jaipur, Rajasthan (Eight devices) 25 July 2008 Bengaluru, Karnataka (Eight Devices) 26 July 2008 Ahmedabad, Gujarat (21 devices) 29-30 July 2008 Surat, Gujarat (18 devices) 13 September 2008 New Delhi (Six devices) 29 September 2008 Modasa, Gujarat (One device) 29 September 2008 Malegaon, Maharashtra (Two devices) 01 October 2008 Tripura, Agartala (Five devices) 30 October 2008 Guwahati, Assam (18 devices) 26-29 November 2008 Mumbai, Maharashtra (Multiple Attacks & Blasts) 27 September 2008 New Delhi (One device) 01January 2008 Rampur, U.P (Two devices)
  • 6. Circa 2010: Transition Patterns - Naxalism Discontent among the 'strategic' arm of Naxals differences between groups supporting armed struggle and other, ready for negotiations Military arm of Naxals becoming aggressive Religion and caste becoming an issues Leveraging the political forces Ambiguous leadership Discontent among members Clash in recruitment and funding sources Naxalism in Transition Naxal Organization Indian government actions and 'reactions' Absence of constructive and 'crowd pulling' ideology
  • 7. Transition of terrorism in India (post 26/11) Transition of terrorism in India (post 26/11) Organised Crime Linkages (local & international) Meticulous operational and strategic planning Recruitment is becoming local focusing on those working in factories and computer literates from big cities Emergence of India as a target of transnational terrorism Expanding logistical homebase Still 'waiting' to carry out mass large scale attacks Impacted by neighborhood Geo-strategic forces
  • 8.
  • 9. Challenges for the security forces Terrain & Demographic Information Intelligence collation from diverse sources Network centric operations & comd & control Technology Platforms Evolution of Organized crime Development of the Concept of Operations Strategic Challenges
  • 10. Challenges for the security forces (Intelligence & Ops) Information availability in multi agency envt Leveraging on predictive patterns Managing short term and long term op activities Planning and monitoring Information asymmetry Command and Control The single largest challenge is the creation of actionable intelligence for actual op execution
  • 11. The Intelligence Stack Strategic Intelligence Operational Intelligence Tactical Intelligence Tactical Intelligence Operational Intelligence Strategic Intelligence Intelligence Consumption Intelligence Creation
  • 12. Technical Intelligence + Human Intelligence Predictive and Investigative Intelligence Intelligence Needs Granularity - Data Cubes WHY WHAT WHERE WHO WHEN
  • 13. Convergence – Human Int and Tech Int Intelligence Agencies - Databases Administrative - Databases Tech Intelligence Datamining Processing Raw Data into Usable form Better Information Collection Internet based information collection and investigation (Track Back) Enhanced Prevent-Prepare-Respond-Recover Structure Identifying Triggers & Patterns Automated analysis of structured & unstructured data Human Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
  • 14.
  • 15.
  • 17. Unconventional Conflict & Intelligence Management System (UCIMS)
  • 18. Intelligence collaboration process Intelligence sources Socio political events Demographics Sat images, maps Technical inputs Data repository - Raw data - Analysis of data - Intelligence creation - Intelligence distribution Actionable intelligence Tactical decision making Intelligence collaboration process
  • 19.
  • 20.  
  • 21.  
  • 22. Combining Data Mining and Link Analysis
  • 26. Network Analysis and Data visualization (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Manual Graphics-based Manual Structured
  • 27. Past historical factual information
  • 28.
  • 30. Naxal Emerging Fault lines Castes and tribes Within tribes Inter-state leadership CPI (Maoist) and frontal organizations Splinter groups The direction these splits take as the government action on all fronts intensifies will have a major bearing on the future of Naxal movement and strategy in India Naxal Movement
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Basis for Risk Mitigation - (Case Study) Low Risks They do not require the formulation of a risk mitigation strategy at this stage of exploration work Moderate Risks Awareness about factors and influences that drive these parameters, and regular monitoring are required. The threats from these risks however will not have a direct impact at this stage Extreme & High Risks Those areas that register a 15+ total on freq * severity require active risk mitigations strategies to be in place
  • 36. Sample KRI Parameters & Triggers for Risk Intelligence Framework (a large mining project in India) - (Case Study)   Common Borders   Topography   Forest Cover that indicates Naxalite hideout zones   Rivers — that could potentially lead to crime and water politics in the future. Seasonal floods, as well as shortage of irrigation water in certain seasons lead to incidents of violence, crime and clashes amongst villagers   Location of a particular district   Population   Incidents in the district   Nature of criminal groups   State of police and governance   Presence of Naxalism (The number, strength and method indicate the pos sibility of Naxalite Attacks)   Ammunition recovery and Arrests within a district (Reflects the strength of the network) Crime/Extremism Geography Local Political Situation   Constituency representative   Opposition parties   Influence of Naxalite political groups   Local support for Naxalites/ political party A constituency with high profile candidates and major political parties attract Naxalite attacks and the crime - politics connection Socio - Economic   Economic Profile   Literacy   Occupation   Youth — education and employment   Percentage of SC/ST * in total population -- A high risk socio - economic profile can provide flashpoints for the future -- The youth form a substant ial part of the “new criminals” * SC/ST – Scheduled Cast e s / Scheduled Tribes Land Politics   Type of Land   Yield   Size of holdings   Land Clashes Caste - based attacks and crimes result in human loss and psyc hological fear in an area Road + Rail   Presence of NH/SH in the district   Condition of roads and rail network   I ncidents on both   Accidents   Closest railway stations and alternative ways of access Infrastructure   Hospitals   Banks   Electricity/Power sup ply   Telecom Circle   Water Local Sentiment   Attitude towards foreigners   Attitude towards Mining   Protests   Mobilizers — NGOs, Pradhans   L ocal media Businesses   No . of Businesses in the area   Year of start and closure   Nature of Business   Ratio of Businesses closed to open Natural Hazard   Earthquakes   Floods   Monsoon   Drought
  • 37. Risk Visualization / Risk Map – Mining Project - (Case Study) Disruptions Methods of Stalling High Risk Medium Risk Low Risk R I S K I N T E L L I G E N C E Vulnerabilities Associated with Legal, Regulatory, & Policy Issues Demonstrations, Strikes Security/Loss/ Sabotage Instruments which can make this happen Extremism/ Crime Political Dynamics People’s Right Activists Local Social & Community Issues Local Contracts Resettlements Pollution Environment Local Employment Socio - Economic Reasons
  • 38. ORKASH-UCIMS on a geospatial platform
  • 39.  
  • 43. Tracking events news with location based search
  • 44. Advanced Search Techniques for Location Intelligence
  • 45.  
  • 46. Monitoring Movement of Tactical Assets
  • 48.
  • 49.
  • 50. THANK YOU Orkash Services Pvt Ltd 75 C, Sector 18 Gurgaon 122 015 Haryana, India Phone: +91 124 4033773 +91 98102 36020 [email_address] .com www.orkash.com
  • 51.
  • 52. Changing security landscape of India India has experienced a continued and an almost consistent security problem pertaining to: -Naxalism - Insurgency -Extremism -Organized crime Drivers of Transition: -Operational Sophistication -Ideological Evolution India's internal security scenario is in a very 'delicate' and a 'vulnerable' stage Unconventional conflicts and deteriorating security mechanisms have forced us to think beyond the routine 'guard and police' protection Essentially non existent, it is high time that India focuses on homeland security protection Long history of terrorism Terrorism Transition Internal Security Security Evolution Homeland Security
  • 53. Homeland security in India Increased focus on HLS post 26/11 Fragmented structure of HLS sector Technology Modernization New Technology Introduction Information Synthesis
  • 54.

Editor's Notes

  1. ghghghghgh
  2. Need of the hour is to converge the existing resources of HUMINT as well as technology to enhance real time intelligence and be able to predict the unforessen by understanding patterns - which is humanly not possible and not achiavable
  3. Warfare and intelligence is becoming very complexed and just having HUMINT is not enough and therefore needs more network based approach which collates as well as demistifies the intelligence from unstructured data bases to structured analyses to derive the intelligence – Helpful in 9/11 and 26/11 kind of investigations