Adrian Kowal, Universidad
de Buenos Aires, Adrian_kowal@hotmail.com
Guillermo
Poblete, Universidad de Buenos Aires, guillermo.facundo.poblete@gmail.com,
PRIMARY
Student Team: YES
Did you use data from both
mini-challenges? YES
Tableau
Approximately how
many hours were spent working on this submission in total?
50 hours
May we post
your submission in the Visual Analytics Benchmark Repository after VAST
Challenge 2015 is complete? YES
Video Download
Video:
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Questions
MC2.1 – Identify those IDs that stand out
for their large volumes of communication.
For each of these IDs
a. Characterize the communication patterns
you see.
b. Based on these patterns, what do you
hypothesize about these IDs?
There are 2 ids that stand out for their large volumes of communication:
1278894 and 839736.
On the image above you can see that the id 1278894 transmits messages
each five minutes along the hours 12, 14, 16, 18 and 20 (the three days) and
the messages that it receives have a similar behavior and come from the same
people that receive them.
We suppose that this is a kind of automatic service message, that use a
fixed device (it doesn´t move around the park).
On the other hand, the id 839736 has a different behavior. On Sunday the
8th at 11.00, it transmits and receives a huge amount of messages
(much more than at any other moment on that weekend).
The 839736 is the most frequent destiny for the employee´s
communications. They also communicates with the id 12788894 and with “externals”
destination with less frequency.
MC2.2 – Describe up to 10 communications
patterns in the data. Characterize who is communicating, with whom, when and
where. If you have more than 10 patterns to report, please prioritize those
patterns that are most likely to relate to the crime.
Pattern 1: Communications to an external source
Here you
can see a change on the usual amount of communications to the outside of the
park, on Sunday at 12.00, compared with the rest of the time on these weekend.
We can
deduce that people is possibly communicating the crime that have just occurred
on the Creighton Pavilion.
On the image below, you can see a map of the people´s positions when
they transmit messages from 11.00 to 12.00, on Sunday the 8th.
A big amount of that messages are sent from the Pavilion, as you can see
on the hotspot placed there.
Pattern 2: Communications from/to id 839736
There is a main burst of
communications to/from the id 839736 starting at 12.00 on Sunday the 8th,
and a smaller one between 14.30 and 15.00.
The first burst comes mainly from
Creighton Pavilion just after it was closed.
We thinks this activity
corresponds to a late reaction of the park’s employees to the discovery of the
crime by the visitor at 11.30 on Sunday.
The second burst of communications,
the smaller one, comes from the entry of the Stage, where Scott should have
done his show. The people assist to that place, but we suppose that the show
had already been cancelled, and the people weren´t informed about that. You can
appreciate this reasoning on the image below.
Pattern
3: Communications of the park´s employees after the crime
Here you can see the amount of
communications made by park´s employees. This messages are made mainly from and
to the id 839736 (orange). It is a change on the communication´s pattern,
produced just after the crime.
On the
image below, we can confirm that a lot of that communication shown on the image
above comes from the Creighton Pavilion.
Patter 4: Communications from visitors inside the park
to other visitor who are also into the park.
The big
amount of communications between 11.30 and 11.45 includes all the
communications inside Wet Land Area, except for those to an external source,
the message from and to IDs 839736 and 1278894. In other words, this are the
communications between visitors inside the park, just after the Creighton
Pavilion re-opens.
We
suppose this is the time of the crime´s discovery made by the visitor,
according to the news.
On the
image below, we can confirm that a lot of that communication shown on the image
above comes from the Creighton Pavilion.
Pattern 5: Communications from Creighton
Pavilion to external sources.
This
bust represents the communications from the Wet Land Area to an external
Source.
They are
made just after the moment, we supposed, the crime was discovered. We assume
that this pattern describes a social behavior similar to the occurred when
people report and incident on Twitter. People needs to spread the news that
something unusual have just happened.
On the
image below, we can confirm that a lot of that communication shown on the image
above comes from the Creighton Pavilion.
MC2.3 – From this data, can you hypothesize when the crime was
discovered? Describe your rationale.
Using the patterns shown
in the MC2.2, we can disintegrate the communications made between 11.00 and
12.00 on Sunday the 8th. In Pattern
4 you can see the beginning of the burst of communications, coming from
some visitor to other visitors inside the park.
From the everyday experience,
we know that the first reaction after witnessing a shocking event is to
communicate that to the nearest known people. And this behavior starts at 11.30
on Sunday the 8th, just after the pavilion was reopened. So we
consider that moment, 11.30 on Sunday
the 8th, as the exact moment of the crime´s discovery made by
the visitors.
On the image bellow, you
can see some of the patterns shown above, all together.
All this
activities comes mainly from Creighton Pavilion, and reinforce our theory about
the moment when the crime was discovered.