Difference between revisions of "ISSS608 2017-18 T3 Assign Hasanli Orkhan Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
<div style=background:#A8A8A8 border:#A3BFB1>
 
<div style=background:#A8A8A8 border:#A3BFB1>
[[Image:Network_Main.png|200px]]
+
[[Image:Network_Main.png|300px]]
 
<b><font size = 6; color="#3a2e29"; style="font-family:Century Gothic">Detecting Suspicious Individuals</font></b>
 
<b><font size = 6; color="#3a2e29"; style="font-family:Century Gothic">Detecting Suspicious Individuals</font></b>
 
</div>
 
</div>
Line 19: Line 19:
 
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
;
 
;
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Conclusion</font>]]
+
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Reference and Comments</font>]]
 
|}
 
|}
 
<br><br>
 
<br><br>
 +
=Feel free to give your feedback=
 +
 +
 +
 +
 +
=Acknowledgement=
 +
 +
Supported by:
 +
*'''Prof. Kam Tin Seong'''
 +
 +
 +
=Reference=
 +
*Gephi coobook. Available at: https://www.safaribooksonline.com/library/view/gephi-cookbook/9781783987405/
 +
*GEPHI – Introduction to Network Analysis and Visualization Available at: http://www.martingrandjean.ch/gephi-introduction/
 +
*Network Analysis Methods for Assessment & Measurement. Available at: https://www.slideshare.net/panklam/network-analysis-methods-for-assessment-measurement

Latest revision as of 23:29, 8 July 2018

Network Main.png Detecting Suspicious Individuals

Overview

Methodology

Findings

Reference and Comments



Feel free to give your feedback

Acknowledgement

Supported by:

  • Prof. Kam Tin Seong


Reference