Comprehensive Intelligence Analysis and Alert System (CIAAS)
Characteristics
Sources of Information
The Problems
Human Analysts
Human Analysts
Requirements
The Approach
Challenges
e. Cognition™ Active Knowledge Network Technology
e. Cognition™ - Emulating the Cognitive Model
Extract Knowledge in Diversified Forms
Use It For Diversified Purposes
Integrate Knowledge Domains
Diversified Disciplines Aggregates new pieces of information to existing knowledge Modeling Automatically draws inferences Network inferencing Integrates information from diverse sources and formats Data miner Performs Analysis (including temporal) Analyzer Inherent simulation capabilities Simulator
Diversified Interfaces
Advantages
Example – Crime Analysis Automation
The Demo
Searching In an Ocean of Information
Some Details
Data Mining Phone Records The Data Miner, together with probable gang structure, is used on the records to generate call patterns
Using Probabilities
Time Series Analysis
Reversing the Use
How It Works A smoothly operating business is extracted from the time-based view, leaving the extraordinary events
Risk Analysis Model Real events spawn hypothetical events which spawn. . . The logical and time interaction of these event chains determines the risk of a catastrophic event
Events Colliding