| 查看: 338 | 回复: 1 | ||
[求助]
请各位大侠帮忙看看这几篇文章istp了吗?
|
|
请各位大侠帮忙看看这几篇文章istp了吗?其中5篇已经ei了。 1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network 2. Research of Multi-path routing protocols based on AODV 3. The study on multipath DSDV in Ad Hoc 4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING 5.Research of electronic business security based on public key encryption methods 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce 即使悲剧也望告知下,多谢,,20金币奉上。。。。 |
» 猜你喜欢
最近几年招的学生写论文不引自己组发的文章
已经有6人回复
职称评审没过,求安慰
已经有56人回复
26申博自荐
已经有3人回复
A期刊撤稿
已经有4人回复
» 本主题相关价值贴推荐,对您同样有帮助:
大侠们帮忙看看这是酵母菌吗
已经有30人回复
请朋友帮忙查下这三篇文章有没有被ISTP检索?谢谢!!
已经有3人回复
求助各位大侠 大师 快来帮帮忙 小女子不胜感激啊 !!!
已经有5人回复
各位大侠帮帮忙
已经有3人回复
帮忙检索几篇论文,谢谢!
已经有3人回复
这个模型怎么用映射、扫略网格划分,请各位大侠帮忙看看吧,小女子感激不尽!
已经有3人回复
帮忙查下检索-在线等
已经有4人回复
求大侠看看文章 有没有被检索
已经有6人回复
求各位大侠帮忙
已经有11人回复
elsevier投稿求助,求各位大侠帮忙
已经有9人回复
各位大侠,帮帮忙
已经有19人回复
急,望各位大侠帮忙(关于 手腕和脚膝盖有点像扭到筋一样的疼痛)
已经有11人回复
帮忙查一下这2篇文章的ISTP检索号
已经有3人回复
半路出家,遇到这个交流阻抗谱不知道怎么分析,还请各位大侠帮忙看看。
已经有13人回复
哪位大侠帮忙查一下,这两篇文章,是否已经被SCI收录,评职称急用
已经有9人回复
请哪位大侠帮忙查一篇文章是否被ISTP检索
已经有5人回复
【讨论】有几道题实在搞不懂,麻烦各位大侠帮忙解决下,会的人很简单。
已经有7人回复
【求助/交流】vector 安装不了怎么回事啊?各位大侠帮帮忙啊
已经有3人回复
文章回来,请大侠帮忙看看
已经有8人回复
【求助】请哪位大侠帮忙算下这几个程序
已经有8人回复
tjuzhuzhiwen
铁杆木虫 (知名作家)
- 应助: 41 (小学生)
- 金币: 5280.2
- 红花: 89
- 沙发: 5
- 帖子: 5382
- 在线: 3363.5小时
- 虫号: 1436262
- 注册: 2011-10-11
- 性别: GG
- 专业: 动力学与控制
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
lyrambler: 金币+20, ★★★★★最佳答案, 十分感谢。 2012-08-31 00:11:12
lyrambler: 金币+20, ★★★★★最佳答案, 十分感谢。 2012-08-31 00:11:12
|
1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network ISTP未检索。 2. Research of Multi-path routing protocols based on AODV ISTP未检索。 3. The study on multipath DSDV in Ad Hoc ISTP未检索。 4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING ISTP已检索。 RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING 作者: Jun, M (Jun, Ma) 书籍团体作者: IEEE 来源出版物: 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 页: 2201-2204 出版年: 2012 被引频次: 0 (来自 Web of Science) 引用的参考文献: 8 [ 查看 Related Records ] 引证关系图 会议: International Conference on Computer Science and Network Technology (ICCSNT) 会议地点: Harbin Normal Univ, Harbin, PEOPLES R CHINA 会议日期: DEC 24-26, 2011 会议赞助商: IEEE 摘要: The advent of electronic business (e-business) has made a large change in the way of business. Electronic business growth has increased very much in a great deal of practices. Researchers have posed rules-based auditing systems for electronic business transactions, but they rely on the auditor's knowledge of e-business fraud highly. While fraud happen, it is difficult to deal with by business systems due to the large number of online transactions. In this paper, we introduce a method that to bring about rules from fraud patterns based on data mining. Nextly, the system can distinguish transactions that have a high chance be deceptive by making use of these rules to e-business databases. 入藏号: WOS:000304720100502 文献类型: Proceedings Paper 语种: English 作者关键词: e-business; data mining; auditing systems 通讯作者地址: Jun, M (通讯作者),Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China. 地址: 1. Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China 电子邮件地址: mj@lit.edu.cn 出版商: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA Web of Science 类别: Computer Science, Hardware & Architecture; Computer Science, Theory & Methods; Engineering, Electrical & Electronic 研究方向: Computer Science; Engineering IDS 号: BAM59 ISBN: 978-1-4577-1584-6 5.Research of electronic business security based on public key encryption methods ISTP未检索。 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce ISTP未检索。 |
2楼2012-08-30 21:06:26













回复此楼