Download TKD: Tools for Knowledge Discovery (lecturer: Eric Atwell)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
School of Computing, University of Leeds
COMP3740 CR32 Knowledge Management and Adaptive Systems (lecturer in Semester 1: Eric Atwell)
COURSEWORK ASSIGNMENT 2; Deadline: 9am 03/12/2010 (week 10)
Cw2 is in 2 parts: (i) a “Knowledge Management” practical task, searching for specific knowledge; and (ii)
reflection on the methods and tools you used to find this knowledge, and how these might be improved. The
objective is to see some limitation of existing keyword-based knowledge management search tools when
searching for ill-defined concepts with no obviously definitive key-words; and possibilities for future
improvements.
MI5, CPNI and other Intelligence and Counter-Terrorism agencies are interested in applying knowledge
management technologies to detecting terrorist activities. Desk Officers managing counter-terrorism surveillance
operations on suspects currently have a wide range of textual and other data to monitor, including surveillance
officer reports, phone tap transcripts, transcripts of interviews with suspects and informants, and intercepted
email, blogs and other electronic communications. The task has been likened to searching for needles in a
haystack; or, more appropriately, searching for threads in a haystack, since the Desk Officer is looking for
evidential links or threads connecting suspects and/or suspicious data.
(i) Your first task is to find at least 3 published papers on knowledge management techniques which could be
applied to this problem, including the full bibliographic reference details, and BRIEFLY summarise what the
technique is and how it is relevant. These should be papers published in academic journals or conference
proceedings, eg (Allanach et al. 2004), (Elovici et al. 2004), (Lowd and Meek 2005). Do NOT use these 3 papers
as your examples! Do NOT cite a whole book, eg (Chen et al 2008), (Wang et al 2006), (Schmid 2006), although
you can cite a self-contained chapter as a paper, for example in a conference proceedings published as a
collection of papers/chapters in a book. Do NOT cite web-pages which are merely announcements or advertising
material on the WWW such as (EPSRC 2009a,b), (Niche Events 2010).
(ii) BRIEFLY state the methods and tools you used to find this knowledge, and how these might be improved.
Which search tool(s) did you use? eg ISI Web of Knowledge, or Google Scholar, or Yahoo, or Wikipedia? Did
you search by subject or by keywords? What search terms did you try, and which were successful? What
possible added functionality would have made your task easier, and what KM technique(s) would this require?
SUBMIT SHORT REPORT (1 side A4 is sufficient, not including references); deadline: 9am 03/12/2010
(week 10). Submit your report as an MS-word .doc file WITH YOUR SURNAME as filename (e.g. Atwell.doc) via
SIS Submit
REFERENCES:
Allanach J et al. 2004. Detecting, tracking, and counteracting terrorist networks via hidden Markov models. Proc
IEEE Aerospace Conference. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1368130
Chen H et al (eds). 2008. Terrorism informatics: knowledge management and data mining for homeland security.
Springer. http://www.springerlink.com/content/t30v36/?p=85eb46736abd4842a647a15ac78f48bb&pi=0
Elovici Y et al. 2004. Using data mining techniques for detecting terror-related activities on the web. Journal of
Information Warfare http://www.ise.bgu.ac.il/faculty/mlas<t/papers/JIW_Paper.pdf
EPSRC. 2009a. Detecting terrorist activities – Call for expressions of interest.
http://www.epsrc.ac.uk/CallsForProposals/Archive/DTAct.htm
EPSRC. 2009b. IDEAS factory - detecting terrorist activities: making sense (EPSRC/ESRC/CPNI-funded 2.2Mpound research project) http://gow.epsrc.ac.uk/ViewGrant.aspx?GrantRef=EP/H023135/1
Lowd D, Meek C. 2005. Adversarial learning. Proceedings of the eleventh ACM SIGKDD International
Conference on Knowledge Discovery in Data Mining. http://portal.acm.org/citation.cfm?id=1081870.1081950
Niche Events. 2010. Welcome to counter terror expo. http://www.counterterrorexpo.com/
Schmid A. 2006. Forum on crime and society. United Nations Publications.
http://books.google.co.uk/books?id=-CqwlfdyW0AC
Wang F et al (eds). 2006. Intelligence and security informatics: Proc WISI 2006. Springer.
http://www.springerlink.com/content/mvq4286pv312/?p=81ea08c9eb234db19c730c14da31ad5e&pi=0
MARKING SCHEME: [up to 20 marks]:
Up to 3 marks: full bibliographic reference details for 3 RELEVANT papers
Up to 2 bonus marks for additional papers
Up to 5 marks: for each paper BRIEFLY summarise what the technique is and how it is relevant
Up to 5 marks for: Which search tool(s) did you use? Did you search by subject or by keywords? What search
terms did you try, and which were successful?
Up to 5 marks for: What possible added functionality would have made your task easier, and what KM
technique(s) would this require?