Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
School of Computing, University of Leeds COMP3740 CR32 Knowledge Management and Adaptive Systems (lecturer in Semester 1: Eric Atwell) COURSEWORK ASSIGNMENT 2; Deadline: 9am 03/12/2010 (week 10) Cw2 is in 2 parts: (i) a “Knowledge Management” practical task, searching for specific knowledge; and (ii) reflection on the methods and tools you used to find this knowledge, and how these might be improved. The objective is to see some limitation of existing keyword-based knowledge management search tools when searching for ill-defined concepts with no obviously definitive key-words; and possibilities for future improvements. MI5, CPNI and other Intelligence and Counter-Terrorism agencies are interested in applying knowledge management technologies to detecting terrorist activities. Desk Officers managing counter-terrorism surveillance operations on suspects currently have a wide range of textual and other data to monitor, including surveillance officer reports, phone tap transcripts, transcripts of interviews with suspects and informants, and intercepted email, blogs and other electronic communications. The task has been likened to searching for needles in a haystack; or, more appropriately, searching for threads in a haystack, since the Desk Officer is looking for evidential links or threads connecting suspects and/or suspicious data. (i) Your first task is to find at least 3 published papers on knowledge management techniques which could be applied to this problem, including the full bibliographic reference details, and BRIEFLY summarise what the technique is and how it is relevant. These should be papers published in academic journals or conference proceedings, eg (Allanach et al. 2004), (Elovici et al. 2004), (Lowd and Meek 2005). Do NOT use these 3 papers as your examples! Do NOT cite a whole book, eg (Chen et al 2008), (Wang et al 2006), (Schmid 2006), although you can cite a self-contained chapter as a paper, for example in a conference proceedings published as a collection of papers/chapters in a book. Do NOT cite web-pages which are merely announcements or advertising material on the WWW such as (EPSRC 2009a,b), (Niche Events 2010). (ii) BRIEFLY state the methods and tools you used to find this knowledge, and how these might be improved. Which search tool(s) did you use? eg ISI Web of Knowledge, or Google Scholar, or Yahoo, or Wikipedia? Did you search by subject or by keywords? What search terms did you try, and which were successful? What possible added functionality would have made your task easier, and what KM technique(s) would this require? SUBMIT SHORT REPORT (1 side A4 is sufficient, not including references); deadline: 9am 03/12/2010 (week 10). Submit your report as an MS-word .doc file WITH YOUR SURNAME as filename (e.g. Atwell.doc) via SIS Submit REFERENCES: Allanach J et al. 2004. Detecting, tracking, and counteracting terrorist networks via hidden Markov models. Proc IEEE Aerospace Conference. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1368130 Chen H et al (eds). 2008. Terrorism informatics: knowledge management and data mining for homeland security. Springer. http://www.springerlink.com/content/t30v36/?p=85eb46736abd4842a647a15ac78f48bb&pi=0 Elovici Y et al. 2004. Using data mining techniques for detecting terror-related activities on the web. Journal of Information Warfare http://www.ise.bgu.ac.il/faculty/mlas<t/papers/JIW_Paper.pdf EPSRC. 2009a. Detecting terrorist activities – Call for expressions of interest. http://www.epsrc.ac.uk/CallsForProposals/Archive/DTAct.htm EPSRC. 2009b. IDEAS factory - detecting terrorist activities: making sense (EPSRC/ESRC/CPNI-funded 2.2Mpound research project) http://gow.epsrc.ac.uk/ViewGrant.aspx?GrantRef=EP/H023135/1 Lowd D, Meek C. 2005. Adversarial learning. Proceedings of the eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. http://portal.acm.org/citation.cfm?id=1081870.1081950 Niche Events. 2010. Welcome to counter terror expo. http://www.counterterrorexpo.com/ Schmid A. 2006. Forum on crime and society. United Nations Publications. http://books.google.co.uk/books?id=-CqwlfdyW0AC Wang F et al (eds). 2006. Intelligence and security informatics: Proc WISI 2006. Springer. http://www.springerlink.com/content/mvq4286pv312/?p=81ea08c9eb234db19c730c14da31ad5e&pi=0 MARKING SCHEME: [up to 20 marks]: Up to 3 marks: full bibliographic reference details for 3 RELEVANT papers Up to 2 bonus marks for additional papers Up to 5 marks: for each paper BRIEFLY summarise what the technique is and how it is relevant Up to 5 marks for: Which search tool(s) did you use? Did you search by subject or by keywords? What search terms did you try, and which were successful? Up to 5 marks for: What possible added functionality would have made your task easier, and what KM technique(s) would this require?