SlideShare uma empresa Scribd logo
1 de 26
Project
Matrix Mapper









Intelligent data gathering and dissemination.
Managing huge amount of unstructured data.
Easy data mining and structured analysis.
Centralized database.
Instant report generation.
Efficient decision making.
Pictorial depiction and pattern generation for
better assimilation as also intelligent
assessment, inference and extrapolation.
The Matrix Mapper is intended to provide a strong, viable,
dependable and effective alternative to the Analyst’s
Notebook and to excel the Sentinel Visualizer. Therefore, for
clarity in concept & visualization, some images of Analyst’s
Notebook have been used.
Manufacturer – i2 IBM
Export Control Regulation - Only available to
businesses, government agencies and
academic institutions operating within the USA
and Russia
COMPETITION VIS-A-VIS
ANALYST‟S NOTEBOOK
ANALYST’S NOTEBOOK

SENTINEL VISUALIZER

It is a visual intelligence analysis environment that
enables to quickly collate, analyze and visualize data
from disparate sources.

Is a Windows based application written in Visual
Studio .NET supporting an MSDE/SQL Server
database. It can connect to a shared server in the
office or run on your local database when you are in
the field.

It centralizes data from multiple sources.

Supports an unlimited number of databases.

The platform provides a flexible data-centric model
optimized for multidimensional data analysis, which is
a key requirement for collaborative working
environments. Increased understanding of the
structure, hierarchy, and method of operation of
criminal, terrorist and fraudulent networks. Data
visualization in 2D.

Data visualization capabilities including 2D and 3D link
charts and stereoscopic graphs.

Social Network Analysis (SNA) and quantitative
analysis techniques that combine organization
theories with mathematical models to help better
understand and target the dynamics of groups,
networks, and organizations.

Built-in Social Network Analysis and Advanced
Network Analysis.
ANALYST’S NOTEBOOK

SENTINEL VISUALIZER

Searching unstructured data using powerful search
capabilities to cast the net wide and deep to ensure
that no data is missed in supporting investigative and
operational activities.

Name disambiguation through aliases and fuzzy
searching.

It requires you to install a hardware dongle in order
to start the program.

No hardware dongle required.

Entities in Analyst's Notebook are shown with a builtin graphic by type (e.g. people).

Each entity in Sentinel Visualizer can have
its own picture that is displayed directly on your link
chart to let you better understand your data.

In Analyst's Notebook, every relationship and line is
the same. However the intensity and incidence of
relationships is clearly delineated.

Different types of links should be weighted differently
(e.g. a brother relationship is very different from two
people who attended a meeting). This is, however, not
possible in very complex cases with multiple nodes.

Timelines are integral to the defining of incidence and
relationships.

Sentinel Visualizer does Temporal Analysis. If your
relationships have information with start and/or end
times, they can be automatically plotted on a
timeline. This lets you quickly see when events occur
and for how long.
Timeline analysis depicts events as they unfold
over time, allowing to understand cause and
effect, identify patterns, and decide upon appropriate
courses of action. Entities can be tracked over time,
to identify their associations with an event or incident.
Transaction pattern analysis enables display of a series
of transactions in chronological order. This helps to
reveal repetitions in patterns of activity and can help to
predict future behavior.
Based on its huge data base, Analyst’s Notebook has
the capability to predict the next event (Probability):

Locations

Persons involved

Time

Date
CAPABILITIES/EXPERTISE OF
AARKTECH AND THEIR DEVELOPMENT
ASSOCIATES, KBCRF, IN REGARD TO
THE :
1. SemantiCS
KBCRF has tremendous exposure and core competency in the field of Semantics.
 Intellectual Property in Computational tools and resources for Indian Languages,
like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel
Corpora, etc.
 Text Analytics Platform - is a multilingual semantic analysis platform which can
take any unstructured data (web data, social network data, blogs etc) as input and
analyse and bring it to a structured database for further analysis.

2. Big Data Analytics
KBCRF has proven capability to work with Big-Data and Text Analytics. MM‟s requirement
for vast data gathering and complex event processing mandates a platform that can handle
“Big Data”.
 Activity Analysis and Fraud Analytics product lines include a Big Data Platform
based on Hadoop that includes workflow, traditional relational databases as well as
non-relational (NOSQL) databases.
 Information Extraction System extracts information from unstructured text from
various domains for information pertinent to the user which can be defined
according to the user requirement.
3. Knowledge Discovery


A product like MM depends critically on large scale acquisition of data from multiple
sources: Internal and external sources, open sources and social media.
 Sources could be structured (credit card transactions, hotel occupancy records etc)

and unstructured (textual case narratives, open sources from the internet etc).
 The media may range from audio and video to images and text.


SmartConnector Technology accomplishes some of these tasks like crawlers, data
base connectors, screen scrapping utilities which are some of the technologies that
need to be deployed.



Similarity Analyser semantically clusters documents according to the various
relationships that a given document has with other documents.



Indian Language Search Engines.



Translingual Information Accessor for classified advertisements.
4. Powerful Visualisation
Efficient in technologies ranging from Flex to HTML5 and have developed User
Interfaces for different form factors from traditional web browsers to mobile
devices such as smart phones (Android, IOS etc) and tablets.
 Relationships with leading design firms based in USA to bring in expertise and
knowhow when required.


5. SNA
Named Entity and Event Resolution System is a hybrid system which works for
identifying 106 entity types with nested tags and has been tested with different
types of language data.
 Entity Relation Identification System is a statistical system which identifies
relation between two entities and the sentiments related to it.


6. User definitions
Aarktech has immense experience of and exposure to :
Designing and defining the architecture of Matrix Mapper on the lines of Analyst
Notebook.
 Domain knowledge and industry specific standards.

FEATURES OF THE MATRIX MAPPER PROJECT
ON THE LINES OF ANALYST’S NOTEBOOK /
SENTINEL VISUALIZER
The Matrix Mapper is meant to establish the interrelationships among hundreds of different people and
things that connect persons with persons via
communication devices (mobile, landline, satellite,
PTT/ SD Radios), credit/ debit cards, banking/
insurance transactions, email, clouds, rail/ road/
plane/ ship/ private transport, addresses, locations,
times, geo-spatial linkages, imagery, GIS and
numerous other means.
Analysts’ Notebook Image

Regardless of the language and platform in which data is available, the MM would be able
to perform cross platform analytics and convert very large volumes of data into graphics
and deploy semantic strengths for knowledge discovery leading to historical and predictive
matrices.
1. Images, icons, photographs and maps
can be swiftly dragged and dropped
onto vortex points illustrating
connections and relationships.
2. Mapping graphics resulting from
relationship analysis, identification
(text, images, audio, video) would
help identify the key elements in a
network after delineating the network
itself and its dimensions.
3. The MM would, using icons, images
and connectivity indicators, clearly
bring out the hierarchy, scaffolding
and functioning of the network firmly
and clearly.
ATM
Visit Time & Date

Date

Time

Date

Time

Date

Time

Shahdara

05/09/12

15: 35

04/11/12

15:55

03/01/13

16:00

Loni

25/09/12

16:00

24/11/12

15:30

23/01/13

16:10

Sarita Vihar

15/10/12

15:45

14/12/12

16:00

13/02/13

16:30

Prediction
Next ATM Withdrawal
The identification
of strategically
placed persons in
the network
including Key
Individuals,
Persons with
Influence,
Gatekeepers etc.
would be analyzed
alongside modus
operandi and
activity patterns as
the most effective
means of ensuring
result oriented
intelligence for
reactive or proactive measures.

Centrality

Between-ness

Closeness

Degree
EVENT
LINKAGE
IN Mm

Terror
Incidents
KBCRF
The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations
(www.svapas.com) and Serendio (www.serendio.com)
ecosystem brings in proven scientific and technical
skills, product development knowledge and
leadership to undertake the challenging enterprise.
The skill inventory includes development experience
with all modern programming and scripting languages,
various SQL and NOSQL database dialects, data warehousing, algorithms, data
structures, data science, user interface design and development with Flex, HTML,
HTML5. KBCRF follow test-driven development methodologies with continuous
integration, test and deployment.
Aarktech
1. Intelligence experience and user domain knowledge - Udayan Mukerji,
the Chief Mentor of Aarktech, has tremendous experience in intelligence
scenarios in India and across the globe. Udayan Mukerji retired from the
Indian Police Service more than three decades of service. During his career,
Udayan Mukerji functioned at various levels and garnered immense
experience as well as thoroughgoing expertise in areas dealing variously with
homeland security, the security of Indian Missions abroad, internal security,
communications security and investigations into security deficiencies. He is
the recipient of the prestigious Indian Police Medal for Meritorious Service
and the President's Medal for Distinguished Service.

2. Aarktech Team is professionally qualified with „IT Security‟ Industry
knowledge. The motivated team ensures best practices and standards of
product for ultimate customer satisfaction.
Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED).
SBMS is a highly secure and sophisticated Messaging Solution,
conceived and being developed successfully under the expert technical
competency of KBCRF and the participation of Aarktech.
Some of the distinctive features of SBMS :
















A user can login only from his workstation – this prevents somebody from
stealing the user ID, password and attempting to break in from some other location.
Operate with low latency on small bandwidths.
Release, distribution, security, and timely delivery of voice, video, data and messaging across
public and closed networks.
Robust LINUX platform at the server end, while interfacing with variety of OS like Windows,
Ubuntu, MAC etc.
Capability to function with Android phones, PDAs, hardened smart phone handsets and other
similar mobile devices.
Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are customized as
per client requirement.
Enhanced security and data integrity - Two factor authentication for logging on and encryption of
IP traffic using the customised SSO and SSL/ IPSec.
Asymmetric keys coupled with key pointers to ensure the most complete security possible.
Granular level of logs to enable forensic analysis of every activity that happens in messaging
application.
Contact Details:
Aarken Technologies Pvt Ltd.
C-12, Chirag Enclave,
New Delhi-110048.
Ph: 011 -26443221
Email: info@aarktech.net

Mais conteúdo relacionado

Mais procurados

A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
PayamBarnaghi
 

Mais procurados (14)

Data Analysis Software
Data Analysis SoftwareData Analysis Software
Data Analysis Software
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
Smart Investigator Datasheet
Smart Investigator DatasheetSmart Investigator Datasheet
Smart Investigator Datasheet
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
 
Insights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsInsights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge Graphs
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOT
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining Techniq
 
Database
DatabaseDatabase
Database
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 

Semelhante a Matrix Mapper

Apache Big D-2.docx
Apache Big D-2.docxApache Big D-2.docx
Apache Big D-2.docx
azurev
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions Brief
Manish Kalra
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data Analytics
Ravi Teja
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
Yehuda Korotkin
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic Wave
Kaniska Mandal
 

Semelhante a Matrix Mapper (20)

Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep Learning
 
B040101007012
B040101007012B040101007012
B040101007012
 
Apache Big D-2.docx
Apache Big D-2.docxApache Big D-2.docx
Apache Big D-2.docx
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions Brief
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data Analytics
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecture
 
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
Offline Signature Recognition and It’s Forgery Detection using Machine Learni...
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETSTOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
 
Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020Introduction to Knowledge Graphs: Data Summit 2020
Introduction to Knowledge Graphs: Data Summit 2020
 
Resume
ResumeResume
Resume
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data Analytics
 
VisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNAVisiCodeMiner - Discovering the Business DNA
VisiCodeMiner - Discovering the Business DNA
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic Wave
 

Mais de aarkentechnologies

Matrix Mapper in Aviation Industry
Matrix Mapper in Aviation IndustryMatrix Mapper in Aviation Industry
Matrix Mapper in Aviation Industry
aarkentechnologies
 
Matrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism UnitsMatrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism Units
aarkentechnologies
 
SBMS in a VIP Security Environment
SBMS in a VIP Security EnvironmentSBMS in a VIP Security Environment
SBMS in a VIP Security Environment
aarkentechnologies
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environment
aarkentechnologies
 
SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management System
aarkentechnologies
 

Mais de aarkentechnologies (6)

Matrix Mapper in Aviation Industry
Matrix Mapper in Aviation IndustryMatrix Mapper in Aviation Industry
Matrix Mapper in Aviation Industry
 
Matrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism UnitsMatrix Mapper for Counter Terrorism Units
Matrix Mapper for Counter Terrorism Units
 
SBMS in a VIP Security Environment
SBMS in a VIP Security EnvironmentSBMS in a VIP Security Environment
SBMS in a VIP Security Environment
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environment
 
SBMS for Global Oil Companies
SBMS for Global Oil CompaniesSBMS for Global Oil Companies
SBMS for Global Oil Companies
 
SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management System
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Matrix Mapper

  • 2.
  • 3.        Intelligent data gathering and dissemination. Managing huge amount of unstructured data. Easy data mining and structured analysis. Centralized database. Instant report generation. Efficient decision making. Pictorial depiction and pattern generation for better assimilation as also intelligent assessment, inference and extrapolation.
  • 4. The Matrix Mapper is intended to provide a strong, viable, dependable and effective alternative to the Analyst’s Notebook and to excel the Sentinel Visualizer. Therefore, for clarity in concept & visualization, some images of Analyst’s Notebook have been used.
  • 5. Manufacturer – i2 IBM Export Control Regulation - Only available to businesses, government agencies and academic institutions operating within the USA and Russia
  • 7. ANALYST’S NOTEBOOK SENTINEL VISUALIZER It is a visual intelligence analysis environment that enables to quickly collate, analyze and visualize data from disparate sources. Is a Windows based application written in Visual Studio .NET supporting an MSDE/SQL Server database. It can connect to a shared server in the office or run on your local database when you are in the field. It centralizes data from multiple sources. Supports an unlimited number of databases. The platform provides a flexible data-centric model optimized for multidimensional data analysis, which is a key requirement for collaborative working environments. Increased understanding of the structure, hierarchy, and method of operation of criminal, terrorist and fraudulent networks. Data visualization in 2D. Data visualization capabilities including 2D and 3D link charts and stereoscopic graphs. Social Network Analysis (SNA) and quantitative analysis techniques that combine organization theories with mathematical models to help better understand and target the dynamics of groups, networks, and organizations. Built-in Social Network Analysis and Advanced Network Analysis.
  • 8. ANALYST’S NOTEBOOK SENTINEL VISUALIZER Searching unstructured data using powerful search capabilities to cast the net wide and deep to ensure that no data is missed in supporting investigative and operational activities. Name disambiguation through aliases and fuzzy searching. It requires you to install a hardware dongle in order to start the program. No hardware dongle required. Entities in Analyst's Notebook are shown with a builtin graphic by type (e.g. people). Each entity in Sentinel Visualizer can have its own picture that is displayed directly on your link chart to let you better understand your data. In Analyst's Notebook, every relationship and line is the same. However the intensity and incidence of relationships is clearly delineated. Different types of links should be weighted differently (e.g. a brother relationship is very different from two people who attended a meeting). This is, however, not possible in very complex cases with multiple nodes. Timelines are integral to the defining of incidence and relationships. Sentinel Visualizer does Temporal Analysis. If your relationships have information with start and/or end times, they can be automatically plotted on a timeline. This lets you quickly see when events occur and for how long.
  • 9.
  • 10. Timeline analysis depicts events as they unfold over time, allowing to understand cause and effect, identify patterns, and decide upon appropriate courses of action. Entities can be tracked over time, to identify their associations with an event or incident. Transaction pattern analysis enables display of a series of transactions in chronological order. This helps to reveal repetitions in patterns of activity and can help to predict future behavior. Based on its huge data base, Analyst’s Notebook has the capability to predict the next event (Probability):  Locations  Persons involved  Time  Date
  • 11. CAPABILITIES/EXPERTISE OF AARKTECH AND THEIR DEVELOPMENT ASSOCIATES, KBCRF, IN REGARD TO THE :
  • 12. 1. SemantiCS KBCRF has tremendous exposure and core competency in the field of Semantics.  Intellectual Property in Computational tools and resources for Indian Languages, like Spell Checker, Morph Analyser, Wordnet, Dictionaries, POS taggers, Parallel Corpora, etc.  Text Analytics Platform - is a multilingual semantic analysis platform which can take any unstructured data (web data, social network data, blogs etc) as input and analyse and bring it to a structured database for further analysis. 2. Big Data Analytics KBCRF has proven capability to work with Big-Data and Text Analytics. MM‟s requirement for vast data gathering and complex event processing mandates a platform that can handle “Big Data”.  Activity Analysis and Fraud Analytics product lines include a Big Data Platform based on Hadoop that includes workflow, traditional relational databases as well as non-relational (NOSQL) databases.  Information Extraction System extracts information from unstructured text from various domains for information pertinent to the user which can be defined according to the user requirement.
  • 13. 3. Knowledge Discovery  A product like MM depends critically on large scale acquisition of data from multiple sources: Internal and external sources, open sources and social media.  Sources could be structured (credit card transactions, hotel occupancy records etc) and unstructured (textual case narratives, open sources from the internet etc).  The media may range from audio and video to images and text.  SmartConnector Technology accomplishes some of these tasks like crawlers, data base connectors, screen scrapping utilities which are some of the technologies that need to be deployed.  Similarity Analyser semantically clusters documents according to the various relationships that a given document has with other documents.  Indian Language Search Engines.  Translingual Information Accessor for classified advertisements.
  • 14. 4. Powerful Visualisation Efficient in technologies ranging from Flex to HTML5 and have developed User Interfaces for different form factors from traditional web browsers to mobile devices such as smart phones (Android, IOS etc) and tablets.  Relationships with leading design firms based in USA to bring in expertise and knowhow when required.  5. SNA Named Entity and Event Resolution System is a hybrid system which works for identifying 106 entity types with nested tags and has been tested with different types of language data.  Entity Relation Identification System is a statistical system which identifies relation between two entities and the sentiments related to it.  6. User definitions Aarktech has immense experience of and exposure to : Designing and defining the architecture of Matrix Mapper on the lines of Analyst Notebook.  Domain knowledge and industry specific standards. 
  • 15. FEATURES OF THE MATRIX MAPPER PROJECT ON THE LINES OF ANALYST’S NOTEBOOK / SENTINEL VISUALIZER
  • 16. The Matrix Mapper is meant to establish the interrelationships among hundreds of different people and things that connect persons with persons via communication devices (mobile, landline, satellite, PTT/ SD Radios), credit/ debit cards, banking/ insurance transactions, email, clouds, rail/ road/ plane/ ship/ private transport, addresses, locations, times, geo-spatial linkages, imagery, GIS and numerous other means.
  • 17. Analysts’ Notebook Image Regardless of the language and platform in which data is available, the MM would be able to perform cross platform analytics and convert very large volumes of data into graphics and deploy semantic strengths for knowledge discovery leading to historical and predictive matrices.
  • 18. 1. Images, icons, photographs and maps can be swiftly dragged and dropped onto vortex points illustrating connections and relationships. 2. Mapping graphics resulting from relationship analysis, identification (text, images, audio, video) would help identify the key elements in a network after delineating the network itself and its dimensions. 3. The MM would, using icons, images and connectivity indicators, clearly bring out the hierarchy, scaffolding and functioning of the network firmly and clearly.
  • 19. ATM Visit Time & Date Date Time Date Time Date Time Shahdara 05/09/12 15: 35 04/11/12 15:55 03/01/13 16:00 Loni 25/09/12 16:00 24/11/12 15:30 23/01/13 16:10 Sarita Vihar 15/10/12 15:45 14/12/12 16:00 13/02/13 16:30 Prediction Next ATM Withdrawal
  • 20. The identification of strategically placed persons in the network including Key Individuals, Persons with Influence, Gatekeepers etc. would be analyzed alongside modus operandi and activity patterns as the most effective means of ensuring result oriented intelligence for reactive or proactive measures. Centrality Between-ness Closeness Degree
  • 22.
  • 23. KBCRF The AU-KBC Research Centre (www.au-kbc.org), Svapas Innovations (www.svapas.com) and Serendio (www.serendio.com) ecosystem brings in proven scientific and technical skills, product development knowledge and leadership to undertake the challenging enterprise. The skill inventory includes development experience with all modern programming and scripting languages, various SQL and NOSQL database dialects, data warehousing, algorithms, data structures, data science, user interface design and development with Flex, HTML, HTML5. KBCRF follow test-driven development methodologies with continuous integration, test and deployment.
  • 24. Aarktech 1. Intelligence experience and user domain knowledge - Udayan Mukerji, the Chief Mentor of Aarktech, has tremendous experience in intelligence scenarios in India and across the globe. Udayan Mukerji retired from the Indian Police Service more than three decades of service. During his career, Udayan Mukerji functioned at various levels and garnered immense experience as well as thoroughgoing expertise in areas dealing variously with homeland security, the security of Indian Missions abroad, internal security, communications security and investigations into security deficiencies. He is the recipient of the prestigious Indian Police Medal for Meritorious Service and the President's Medal for Distinguished Service. 2. Aarktech Team is professionally qualified with „IT Security‟ Industry knowledge. The motivated team ensures best practices and standards of product for ultimate customer satisfaction.
  • 25. Aarktech has coordinated the successful initiation of SBMS project for Tata Power SED (TPSED). SBMS is a highly secure and sophisticated Messaging Solution, conceived and being developed successfully under the expert technical competency of KBCRF and the participation of Aarktech. Some of the distinctive features of SBMS :          A user can login only from his workstation – this prevents somebody from stealing the user ID, password and attempting to break in from some other location. Operate with low latency on small bandwidths. Release, distribution, security, and timely delivery of voice, video, data and messaging across public and closed networks. Robust LINUX platform at the server end, while interfacing with variety of OS like Windows, Ubuntu, MAC etc. Capability to function with Android phones, PDAs, hardened smart phone handsets and other similar mobile devices. Messages are encrypted using 3DES, AES, Blowfish and proprietary algorithms are customized as per client requirement. Enhanced security and data integrity - Two factor authentication for logging on and encryption of IP traffic using the customised SSO and SSL/ IPSec. Asymmetric keys coupled with key pointers to ensure the most complete security possible. Granular level of logs to enable forensic analysis of every activity that happens in messaging application.
  • 26. Contact Details: Aarken Technologies Pvt Ltd. C-12, Chirag Enclave, New Delhi-110048. Ph: 011 -26443221 Email: info@aarktech.net

Notas do Editor

  1. Please go through the features of the Analysts’ Notebook once more, carefully. Let us not omit anything critical which can be later viewed as deliberate and/ or tending to inaccuracies.