Call Us 24x7
+1 (315) 636-4564
  • You are here
  • Home
  • /
  • Products
  • /
  • Nirnaya

Nirnaya is an analytics tool which can be used for performing various analysis on CDRs/SDRs and tower logs by cyber police or similar regulatory teams, for identifying the possible suspects in a crime.

Anomaly Detection

The anomalous call behavior of suspects can be an indication of suspects involvement in a crime.

Time Series Analysis

Location and movement of suspects can be analysed from tower logs and CDRs. The movement of suspects can be visualized on maps which will give breakthrough insights to aid the investigations

Geo Fencing

Calls from the sensitive geographical locations like Prisons, Country Borders, Defence establishments etc. can be identified from the tower logs and CDRs.

Sandwich Pattern Analysis

To avoid being tapped, perpetrators of crime may avoid direct calling and route the call through a mediator. This can be identified through pattern analysis which will spot the recurring patterns of call behaviours among the suspects.

Frequent Call Pattern Analysis

Frequent callers and diallers of the suspects can be easily queried from the database. Frequent callers can be appropriately visualized to identify the associations among a group of suspects.

Short Duration Call Analysis

At the time of committing a crime the perpetrators may make series of short duration calls to communicate with the accomplices.

Sun Rise Analysis

The CDRs can be analysed and all the details of the suspects including the callers, diallers, duration, frequency and any other user defined data can be stored and retrieved.

Commonality Analysis

The common callers and IMEI numbers in multiple crime locations can be identified and visualized.

Suspect Analysis

The Number, IMEIs, home locations of the suspects are stored in the database for investigators perusal.

Conference Call Analysis

The conference call among the perpetrators of crime can be precisely spotted.

Equipment Analysis

If the suspects dump the old handset and SIM card after committing crime, it can be identified using the tool.

Recent Articles

Yes, the Big Data has occupied nearly all businesses at present and there is certainly no denial that it will continue to exist forever, no matter how much technology will evolve, the

Read More »

One could find many random articles on Big Data but still very few understand it in the actual sense. Other than that, only few are those who will know it in deep, others have just

Read More »

Apcu is a php module used for data caching. Steps for the installation is as follows 1. Login in to server via SSH with root access 2. Install necessary pcre-devel package prior

Read More »

Most people are now familiar with the term e-commerce because of the emerging online retail stores like eBay, Flipkart, Amazon, and many more. E-commerce stands for electronic commerce

Read More »