Difference between revisions of "ISSS608 2017-18 T3 Assign Hasanli Orkhan Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 1: Line 1:
<div style=background:#DDA0DD border:#A3BFB1>
+
<div style=background:#A8A8A8 border:#A3BFB1>
 
[[Image:Network_Main.png|200px]]
 
[[Image:Network_Main.png|200px]]
 
<b><font size = 6; color="#3a2e29"; style="font-family:Century Gothic">Detecting Suspicious Individuals</font></b>
 
<b><font size = 6; color="#3a2e29"; style="font-family:Century Gothic">Detecting Suspicious Individuals</font></b>
Line 5: Line 5:
 
<!--Navigation-->
 
<!--Navigation-->
 
{|style="background-color:#0b3d53;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0"  |  
 
{|style="background-color:#0b3d53;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0"  |  
| style="font-family:Century Gothic; font-size:100%; solid #1B338F; background:#eae5e4; text-align:center;" width="25%" |   
+
| style="font-family:Century Gothic; font-size:100%; solid #1B338F; font-weight:bold; background:#A8A8A8; text-align:center;" width="25%" |   
 
;
 
;
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan|<font color="#000000">Overview</font>]]
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan|<font color="#000000">Overview</font>]]
  
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#DDA0DD; width=25%" |  
+
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
;
 
;
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Methodology|<font color="#000000">Methodology</font>]]
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Methodology|<font color="#000000">Methodology</font>]]
  
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#DDA0DD; width=25%" |  
+
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
;
 
;
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Insights|<font color="#000000">Findings</font>]]
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Insights|<font color="#000000">Findings</font>]]
  
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#DDA0DD; width=25%" |  
+
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
;
 
;
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Conclusion</font>]]
 
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Conclusion</font>]]
 
|}
 
|}
 
<br><br>
 
<br><br>

Revision as of 21:27, 8 July 2018

Network Main.png Detecting Suspicious Individuals

Overview

Methodology

Findings

Conclusion