數據欺詐 的英文怎麼說
中文拼音 [shǔjùqīzhà]
數據欺詐
英文
data diddling- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 欺 : 動詞1. (欺騙) deceive; cheat 2. (欺負) bully; take advantage of
- 詐 : 動詞1 (欺騙) cheat; deceit; swindle 2 (假裝) pretend; feign 3 (用假話試探 使對方吐露真情)bl...
- 數據 : data; record; information
- 欺詐 : fake; cheat; deceive; swindle
-
We put focal point on the choice and design that the model of data mining, on the basis of the already studies of abroad and the actual needs of mobile telecommunication company. five data mining models of our mobile telecommunication operation are putted forward : customer value model, customer retention model, fraud detection model, customer segment model and best promotion method model. an online survey system was set up to collect research data, and sas enterprise miner was used to test and appraise these models
本文沒有對的數據挖掘理論及建模方法等作過多的闡述,也沒有對數據倉庫建設方面做過細的探討,而是將重點放在數據挖掘模型的選擇與設計上,在國外的已有研究的基礎上,結合企業調研中企業的實際需要,提出了我國移動通信營業的客戶價值、客戶保持、客戶細分、欺詐識別和促銷方式選擇等五個數據挖掘模型;並建立了網上的問卷調查系統來收集研究數據,在sasenterpriseminer中對模型進行了驗證與評價。By combining the operators ? experience and the sample data, this paper presented how to build the model of customer fraudulent with bayesian network based on the data mining
將電信業務人員的經驗知識和樣本數據相結合,在數據挖掘技術的基礎上,提出了一種基於貝葉斯網路的電信話費欺詐建模方法。In 2005, according to the united nations, global migrants remitted $ 232 billion, of which up to 20 % was lost on the way, mostly in bank charges or fraud
根據聯合國的統計, 2005年全球移民工人總共匯出2320億美元,其中的20 %大多數要麼以收費形式流入銀行的錢包,要麼由於欺詐行為最終丟失。Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person ' s personal data in some way that involves fraud or deception, typically for ecomomic gain
身份盜竊和身份欺詐是某種犯罪的專用名詞,犯罪分子通過欺騙和詭計等不正當地手段收集其他人的個人數據,典型目的是為了獲得商業利益。Some data mining models such as fraud detection models may have a short useful life and require to be recalibrated at a frequent interval
一些數據挖掘模型(如欺詐檢測)的使用期可能較短,需要經常重新校準。To limit such damage, risk managers ( employed by the software developers or the merchants themselves ) study sales data compiled before the anti - fraud software was implemented
為使這種危害降到最低,風險經理(由軟體公司或商家雇請)在正式使用防欺詐軟體之前,會研究那些編輯過的銷售數據。Third, the importance of data mining applied to china ' s telecom enterprises is discussed. the following modes of three data mining systems, including client losing, client fraud, and time sequence, are developed to meet the need of hangzhou telecom enterprise. fourth, based on this, the point of view that data mining is applied to the telecom is put forward
接著從中國電信運營企業的實際情況出發,分析探討了中國電信企業運用數據挖掘的重要性,根據杭州電信的實際需求,開發了針對客戶欺詐、客戶流失和時間序列這三個應用領域數據挖掘系統,最後對電信企業應用數據挖掘技術提出了自己的看法。To appear in ph. d. workshop of icde 2006, seoul, korea. 13 alon n, matias y, szegedy m. the space complexity of approximating the frequency moments. in proc
在欺詐和安全監控應用中,我們往往對于不同時間到達的數據賦予不同的權重這是因為最新的數據和預測結果具有更強的相關性。On the batch processing server, the data is checked for patterns of credit card fraud
在批處理服務器上,針對信用卡欺詐模式檢查數據。Although the fraud detection produces a small amount of data updating data in a small number of columns if an account shows suspicious activity, the checks are computation - intensive and require substantial server resources
雖然欺詐檢測產生了少量數據(如果帳戶顯示可疑活動,則更新少量列的數據) ,但檢查操作包含大量計算並需要豐富的服務器資源。They are everywhere, from plain - text databases such as the unix etc passwd file to large databases such as those that track shopping habits or fight credit card fraud
從純文本數據庫(比如unix / etc / passwd文件)到大型數據庫(比如追蹤購物習慣或者預防信用卡欺詐的數據庫) ,它們無處不在。分享友人