Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Precrime Data Mining
Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison
Previous page
Table of content
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Laying Out Forms
Formatting Forms
Publishing Form Templates
Connecting Forms to Databases
Writing Advanced Event Handlers
The .NET Developers Guide to Directory Services Programming
Optimizing Search Performance
Virtual List View Searches
Schema Extension Best Practices
Search Flags and Indexing
Creating Groups in Active Directory and ADAM
Adobe After Effects 7.0 Studio Techniques
Masks
Virtual Cinematography
Camera Blur
Smoothing and Destabilizing
Video Gamma Space
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
User Datagram Protocol
Windows Internet Name Service (WINS)
Internet Information Services (IIS) and the Internet Protocols
Internet Protocol Security (IPSec)
An Introduction to Design Patterns in C++ with Qt 4
The Qt Core Module
Dialogs
Visitor: Generating Playlists
Section C.1. The Preprocessor: For #including Files
Qt References
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Overview of the Windows Script Host
Constants, Variables, and Arrays
Conditional Logic
Appendix A WSH Administrative Scripting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies