vapd a visionary system for uncertainty aware
play

VAPD A Visionary System for Uncertainty Aware Decision Making in - PowerPoint PPT Presentation

VAPD A Visionary System for Uncertainty Aware Decision Making in Crime Analysis Florian Stoffel, Dominik Sacha, Geoffrey Ellis, Daniel A. Keim 2 CCA Comparative Case Analysis CCA aims to find patterns in incidents or crime events that


  1. VAPD · A Visionary System for Uncertainty Aware Decision Making in Crime Analysis Florian Stoffel, Dominik Sacha, Geoffrey Ellis, Daniel A. Keim

  2. 2 CCA – Comparative Case Analysis „CCA aims to find patterns in incidents or crime events that will potentially link them .“ [Practice Advice on Analysis, NPIA] P Volume Crime Data Data Processing and Analysis Decision Maker Output • linked crimes • common patterns Requires (fast), accurate, verifiable, and trustworthy information.

  3. 3 CCA – State of the Art Methods • Network analysis • Visual clustering • Similarity measures • Geo data analysis • Text data analysis

  4. 4 Text Processing Pipeline – The Data 1 2 3 4 n Domain Language Stop Word Tokenization POS Tagging Specific Detection Removal Analytics en en en en en U/K U/K U/K N U/K U/K OFFENDERS SMASHED KITCHEN WINDOW AT REAR OF PREMISES AND ENTERED OFFENDERS OFFENDERS N THROUGH SAME TIDY OFFENDERS OFFENDERS SEARCH OF DOWNSTAIRS REMOVED TELEVISION AND MADE EXIT THROUGH REAR … KITCHEN DOOR … … … t … …

  5. 5 Problems – Text Analytics • Text data analysis is an active U/K OFFENDERS SMASHED KITCHEN research area. WINDOW AT REAR OF PREMISES AND ENTERED THROUGH SAME TIDY SEARCH OF DOWNSTAIRS REMOVED TELEVISION • Semantics, grammar, language AND MADE EXIT THROUGH REAR use are problems for the KITCHEN DOOR analysis.

  6. 6 Problems – Text Analytics - Basics • Tokenization: ‘ U/K ’ U _ / _ K or UK ? U/K OFFENDERS SMASHED KITCHEN WINDOW AT REAR OF PREMISES AND • Determining POS Tags ENTERED THROUGH SAME TIDY SEARCH OF DOWNSTAIRS REMOVED TELEVISION • Lib A: 58% tagged (20 of 34) AND MADE EXIT THROUGH REAR • Lib B: 41% tagged (14 of 34) KITCHEN DOOR • Lib A: 30% incorrect (6 of 20) • Lib B: 14% incorrect (2 of 14)

  7. 7 Problems – Text Analytics – Higher Level Named entity detection Organization: REAR OF U/K OFFENDERS SMASHED KITCHEN Organization: REMOVED WINDOW AT REAR OF PREMISES AND Organization: TELEVISION ENTERED THROUGH SAME TIDY SEARCH Name: MADE OF DOWNSTAIRS REMOVED TELEVISION AND MADE EXIT THROUGH REAR Location: U_/_K KITCHEN DOOR

  8. 8 Text Processing Pipeline – “Real” Data There are many different variants of analysis results!

  9. 9 Text Processing: Challenges for VAPD Uncertainty Uncertainty Uncertainty Uncertainty Uncertainty Provenance Provenance Provenance Provenance Provenance 1 2 3 4 n Domain Language Stop Word Tokenization POS Tagging Specific Detection Removal Analytics C1: Uncertainty quantification C2: Data provenance for each (C1.1) and propagation (C1.2) analysis step. for each analysis step.

  10. 10 Uncertainty-enabled CCA Part II – Raising Uncertainty Awareness and its Consequences

  11. Searching for Evidence Human Confrontation and Reasoning System Action Visualisation Externalisation & Hypothesis Internalisation Data Knowledge Insight Model Finding Knowledge Generation Loop Veri fi cation Loop Exploration Loop The Role of Uncertainty, Awareness, and Trust in Visual Analytics Dominik Sacha, Hansi Senaratne, Bum Chul Kwon, Member, IEEE , Geoffrey Ellis, and Daniel A. Keim, Member, IEEE VAST 2015 Wednesday, October 28, 16:15-17:55, Room: Red

  12. 12 Guidelines for Handling Uncertainties – (More on Wednesday) • System • G1: Quantify Uncertainty in Each Component Part I Foundations • G2: Propagate and Aggregate Uncertainties • G3: Visualise Uncertainty Information Exploring • G4: Enable Interactive Uncertainty Exploration Part II Uncertainties • Human • G5: Make the System Functions Accessible • G6: Support the Analyst in Uncertainty Aware Sensemaking Human Issues - • G7: Analyse Human Behaviour in order to Derive Hints on Problems Support Trust • G8: Enable Analysts to Track and Review their Analysis Calibration

  13. 13 CCA Table View – Adding Uncertainty (Data Item Level) Selected Crime Similar Crimes

  14. 14 Uncertainty Exploration & Filtering Explore Uncertainty Dimensions Sensitivity Analysis Weighting & Filtering Uncertainty Exploration Crime Table Filtered Crime Table Analyze and Understand Uncertainties and its Impacts on the Data ”Back - Propagate” Changes

  15. 15 Reasoning Space - Uncertainty Aware Sensemaking

  16. 16 Analysing Human Behaviour – Interaction Capturing • VA-System/CCA-Table Interactions (Exploration) • Uncertainty Exploration Interactions (Exploration) • Reasoning Space Interactions (Verification) • Widget/Element Interactions (Verification) • Derived Measures • Time (exploration vs. verification), switches, clicks, move overs/ “touches”, number of evidences, graph- complexity, etc…

  17. 17 Summary & Future Work Human Issues – Trust Building Raising Uncertainty Awareness Supporting CCA Analysis Uncertainty / Data Provenance Trust / Analytic Provenance Develop/Create/Finalize a Prototype that can be Used by Crime Analysts

  18. 18 Lots of Challenges • Combine, Integrate and Realize Ideas and Prototypes • Uncertainty Quantification in NLP (Pipeline & Data Item Level) • Uncertainty Aggregation and Interactive Exploration • Visualizing and Communicating Uncertainties and Trust • Inferring a Users Trust (from User Interaction & Observation) • Bridging and Investigating Uncertainty and Trust Relations • Measure and Detect “Dangerous” Configurations • E.g., High Uncertainty and High Trust • Depends on Analysis Case • …

  19. 19 THANK YOU! Questions? For more information about our work please contact Florian Stoffel florian.stoffel@uni-konstanz.de http://www.vis.uni-konstanz.de/en/members/fstoffel/ Computer Dominik Sacha Human Action Visualization Hypothesis dominik.sacha@uni-konstanz.de Data Knowledge Model Insight Finding Knowledge http://www.vis.uni-konstanz.de/en/members/sacha/ Generation Veri fi cation Loop Loop Exploration Loop

  20. 20 References • Adderley, Richard. “Exploring the differences between the cross industry process for data mining and the National Intelligence Model using a self organising map case study.” Business intelligence and performance management. Springer London, 2013. 91-105. • National Policing Improvement Agency. “Practice Advice on Analysis.” Wyboston, 2008.

  21. 21 Image and Icon Sources Title image by Brandon Anderson, https://flic.kr/p/7o8ffA, (CC BY-NC- ND 2.0 License) Icons in illustrations • Octicons Icons (MIT License, https://www.iconfinder.com/iconsets/octicons) • Nuvola Icons (by David Vignoni, LGPL License, https://www.iconfinder.com/iconsets/nuvola2) • Developer Kit Icons (Free to use, by Ozturk, https://www.iconfinder.com/iconsets/developerkit)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend