VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Registrieren


Typus
Verschleierung
Bearbeiter
Graf Isolan
Gesichtet
Yes
Untersuchte Arbeit:
Seite: 191, Zeilen: 10-19
Quelle: Xu and Chen 2005a
Seite(n): 104-105, Zeilen: p.104, right column 15-22 - p.105, left column 1-4
6.4 SUBGROUP DETECTION [FN 33]

A terrorist network can often be partitioned into cells (subgroups) consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in the data. Hierarchical clustering methods have been proposed to partition a network into subgroups (Wasserman, S., and Faust, K., 1994). Cliques whose members are fully or almost fully connected can also be detected based on clustering results.

[FN 33] The most of the material presented in this Section is already published in (Memon N., Larsen Henrik Legind, 2006c)

[p. 104]

Subgroup detection

A criminal network can often be partitioned into subgroups consisting of individuals who closely interact with each other. Given a network, traditional data mining techniques such as cluster analysis may be employed to detect underlying groupings that are not otherwise apparent in

[p. 105]

the data. Hierarchical clustering methods have been proposed to partition a network into subgroups [EN 11]. Cliques whose members are fully or almost fully connected can also be detected based on clustering results.

[EN 11] Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications (Cambridge: Cambridge University Press, 1994).

Anmerkungen

Indeed: not only does this paragraph appear here in Nm's thesis but also in a number of Nm's papers, the earliest being a contribution to a conference in November 2005 and appearing here [1]. Thus the formulation by Xu and Chen (2005a) presented here still predates any analogous text by Nm by at least several months. Nm's only contribution has been to change the object of research from "criminals" to "terrorists".

This furthermore begs the question if Nm's iMiner software prototype, which is at the heart of his thesis is far from Xu and Chen's CrimeNet explorer.

Sichter
(Graf Isolan), Bummelchen