84,081 research outputs found

    CA2: Cyber Attacks Analytics

    Full text link
    The VAST Challenge 2020 Mini-Challenge 1 requires participants to identify the responsible white hat groups behind a fictional Internet outage. To address this task, we have created a visual analytics system named CA2: Cyber Attacks Analytics. This system is designed to efficiently compare and match subgraphs within an extensive graph containing anonymized profiles. Additionally, we showcase an iterative workflow that utilizes our system's capabilities to pinpoint the responsible group.Comment: IEEE Conference on Visual Analytics Science and Technology (VAST) Challenge Workshop 202

    Understanding Hidden Memories of Recurrent Neural Networks

    Full text link
    Recurrent neural networks (RNNs) have been successfully applied to various natural language processing (NLP) tasks and achieved better results than conventional methods. However, the lack of understanding of the mechanisms behind their effectiveness limits further improvements on their architectures. In this paper, we present a visual analytics method for understanding and comparing RNN models for NLP tasks. We propose a technique to explain the function of individual hidden state units based on their expected response to input texts. We then co-cluster hidden state units and words based on the expected response and visualize co-clustering results as memory chips and word clouds to provide more structured knowledge on RNNs' hidden states. We also propose a glyph-based sequence visualization based on aggregate information to analyze the behavior of an RNN's hidden state at the sentence-level. The usability and effectiveness of our method are demonstrated through case studies and reviews from domain experts.Comment: Published at IEEE Conference on Visual Analytics Science and Technology (IEEE VAST 2017

    Using the VAST Challenge in Undergraduate CS Research

    Get PDF
    The Visual Analytics Science and Technology (VAST) Challenge is a yearly competition designed to push forward visual analytics research through synthetic, yet realistic analytic tasks. In this paper, we discuss the challenges and the successes we have experienced incorporating the VAST Challenge and associated datasets into undergraduate research programs at two liberal arts colleges. We advocate for increased undergraduate participation in this and similar competitions, arguing they afford unique opportunities for positive development in early researchers

    Visual analytics: tackling data related challenges in healthcare process mining

    Get PDF
    2018 Conference paper presented at Strathmore University. Thematic area(Health, Healthcare Management and Research Ethics)Data-science approaches such as Visual analytics tend to be process blind whereas process-science approaches such as process mining tend to be model-driven without considering the “evidence” hidden in the data. Use of either approach separately faces limitations in analysis of healthcare data. Visual analytics allows humans to exploit their perceptual and cognitive capabilities in processing data, while process mining represents the data in terms of activities and resources thereby giving a complete process picture. We use a literature survey of research that has deployed either or both Visual analytics and process mining in the healthcare environments to discover strengths that can help solve open problems and challenges in healthcare data when using process mining. We present a visual analytics (data science) approach in solving data challenges in healthcare process mining (process science). Historical data (event logs) obtained from organizational archives are used to generate accurate and evidence-based activity sequences that are manipulated and analysed to answer questions that could not be tackled by process mining. The approach can help hospital management and clinicians among others, audit their business processes in addition to providing important operational information. Other beneficiaries are those organizations interested in forensic information regarding individuals and groups of patients.1.Institute of Computing and Informatics, Technical University of Mombasa; 2.Faculty of information Technology, Strathmore University 3.School of Computing and Information technology, Muranga University of technology; 4.School of Computing and Informatics, Masinde Muliro University of Science and Technolog

    Uncertainty-aware video visual analytics of tracked moving objects

    Get PDF
    Vast amounts of video data render manual video analysis useless while recent automatic video analytics techniques suffer from insufficient performance. To alleviate these issues we present a scalable and reliable approach exploiting the visual analytics methodology. This involves the user in the iterative process of exploration hypotheses generation and their verification. Scalability is achieved by interactive filter definitions on trajectory features extracted by the automatic computer vision stage. We establish the interface between user and machine adopting the VideoPerpetuoGram (VPG) for visualization and enable users to provide filter-based relevance feedback. Additionally users are supported in deriving hypotheses by context-sensitive statistical graphics. To allow for reliable decision making we gather uncertainties introduced by the computer vision step communicate these information to users through uncertainty visualization and grant fuzzy hypothesis formulation to interact with the machine. Finally we demonstrate the effectiveness of our approach by the video analysis mini challenge which was part of the IEEE Symposium on Visual Analytics Science and Technology 2009

    VAST contest dataset use in education

    Full text link
    The IEEE Visual Analytics Science and Technology (VAST) Symposium has held a contest each year since its inception in 2006. These events are designed to provide visual analytics researchers and developers with analytic challenges similar to those encountered by professional information analysts. The VAST contest has had an extended life outside of the symposium, however, as materials are being used in universities and other educational settings, either to help teachers of visual analytics-related classes or for student projects. We describe how we develop VAST contest datasets that results in products that can be used in different settings and review some specific examples of the adoption of the VAST contest materials in the classroom. The examples are drawn from graduate and undergraduate courses at Virginia Tech and from the Visual Analytics “Summer Camp ” run by the National Visualization and Analytics Center in 2008. We finish with a brief discussion on evaluation metrics for education

    Segue: Overviewing Evolution Patterns of Egocentric Networks by Interactive Construction of Spatial Layouts

    Full text link
    Getting the overall picture of how a large number of ego-networks evolve is a common yet challenging task. Existing techniques often require analysts to inspect the evolution patterns of ego-networks one after another. In this study, we explore an approach that allows analysts to interactively create spatial layouts in which each dot is a dynamic ego-network. These spatial layouts provide overviews of the evolution patterns of ego-networks, thereby revealing different global patterns such as trends, clusters and outliers in evolution patterns. To let analysts interactively construct interpretable spatial layouts, we propose a data transformation pipeline, with which analysts can adjust the spatial layouts and convert dynamic egonetworks into event sequences to aid interpretations of the spatial positions. Based on this transformation pipeline, we developed Segue, a visual analysis system that supports thorough exploration of the evolution patterns of ego-networks. Through two usage scenarios, we demonstrate how analysts can gain insights into the overall evolution patterns of a large collection of ego-networks by interactively creating different spatial layouts.Comment: Published at IEEE Conference on Visual Analytics Science and Technology (IEEE VAST 2018

    SAINS DATA, BIG DATA, DAN ANALISIS PREDIKTIF: SEBUAH LANDASAN UNTUK KECERDASAN KEAMANAN SIBER

    Get PDF
    Abstrak – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodologi sains data digunakan untuk memilah, memilih dan mempersiapkan sejumlah data untuk diproses dan dianalisis. Teknologi big data mampu mengumpulkan data dengan sangat banyak dari berbagai sumber dengan tujuan untuk mendapatkan informasi dengan visualisasi tren atau menyingkapkan pengetahuan dari suatu peristiwa yang terjadi baik dimasa lalu, sekarang, maupun akan datang dengan kecepatan pemrosesan data sangat tinggi. Analisis prediktif memberikan wawasan analisis lebih dalam dan kemunculan machine learning membawa analisis data ke tingkat yang lebih tinggi dengan bantuan teknologi kecerdasan buatan dalam tahap pemrosesan data mentah. Analisis prediktif dan machine learning menghasilkan laporan berbentuk visual untuk pengambil keputusan dan pemangku kepentingan. Berkenaan dengan keamanan siber, big data menjanjikan kesempatan dalam rangka untuk mencegah dan mendeteksi setiap serangan canggih siber dengan memanfaatkan data keamanan internal dan eksternal.Kata Kunci: analisis prediktif, big data, intelijen, keamanan siber, sains dataAbstract – Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data.Keywords: big data, cyber security, data science, intelligence, predictive analytic
    • …
    corecore