數據欺詐 的英文怎麼說

中文拼音 [shǔzhà]
數據欺詐 英文
data diddling
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1. (欺騙) deceive; cheat 2. (欺負) bully; take advantage of
  • : 動詞1 (欺騙) cheat; deceit; swindle 2 (假裝) pretend; feign 3 (用假話試探 使對方吐露真情)bl...
  • 數據 : data; record; information
  • 欺詐 : fake; cheat; deceive; swindle
  1. We put focal point on the choice and design that the model of data mining, on the basis of the already studies of abroad and the actual needs of mobile telecommunication company. five data mining models of our mobile telecommunication operation are putted forward : customer value model, customer retention model, fraud detection model, customer segment model and best promotion method model. an online survey system was set up to collect research data, and sas enterprise miner was used to test and appraise these models

    本文沒有對的挖掘理論及建模方法等作過多的闡述,也沒有對倉庫建設方面做過細的探討,而是將重點放在挖掘模型的選擇與設計上,在國外的已有研究的基礎上,結合企業調研中企業的實際需要,提出了我國移動通信營業的客戶價值、客戶保持、客戶細分、識別和促銷方式選擇等五個挖掘模型;並建立了網上的問卷調查系統來收集研究,在sasenterpriseminer中對模型進行了驗證與評價。
  2. By combining the operators ? experience and the sample data, this paper presented how to build the model of customer fraudulent with bayesian network based on the data mining

    將電信業務人員的經驗知識和樣本相結合,在挖掘技術的基礎上,提出了一種基於貝葉斯網路的電信話費建模方法。
  3. In 2005, according to the united nations, global migrants remitted $ 232 billion, of which up to 20 % was lost on the way, mostly in bank charges or fraud

    聯合國的統計, 2005年全球移民工人總共匯出2320億美元,其中的20 %大多要麼以收費形式流入銀行的錢包,要麼由於行為最終丟失。
  4. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person ' s personal data in some way that involves fraud or deception, typically for ecomomic gain

    身份盜竊和身份是某種犯罪的專用名詞,犯罪分子通過騙和詭計等不正當地手段收集其他人的個人,典型目的是為了獲得商業利益。
  5. Some data mining models such as fraud detection models may have a short useful life and require to be recalibrated at a frequent interval

    一些挖掘模型(如檢測)的使用期可能較短,需要經常重新校準。
  6. To limit such damage, risk managers ( employed by the software developers or the merchants themselves ) study sales data compiled before the anti - fraud software was implemented

    為使這種危害降到最低,風險經理(由軟體公司或商家雇請)在正式使用防軟體之前,會研究那些編輯過的銷售
  7. Third, the importance of data mining applied to china ' s telecom enterprises is discussed. the following modes of three data mining systems, including client losing, client fraud, and time sequence, are developed to meet the need of hangzhou telecom enterprise. fourth, based on this, the point of view that data mining is applied to the telecom is put forward

    接著從中國電信運營企業的實際情況出發,分析探討了中國電信企業運用挖掘的重要性,根杭州電信的實際需求,開發了針對客戶、客戶流失和時間序列這三個應用領域挖掘系統,最後對電信企業應用挖掘技術提出了自己的看法。
  8. To appear in ph. d. workshop of icde 2006, seoul, korea. 13 alon n, matias y, szegedy m. the space complexity of approximating the frequency moments. in proc

    和安全監控應用中,我們往往對于不同時間到達的賦予不同的權重這是因為最新的和預測結果具有更強的相關性。
  9. On the batch processing server, the data is checked for patterns of credit card fraud

    在批處理服務器上,針對信用卡模式檢查
  10. Although the fraud detection produces a small amount of data updating data in a small number of columns if an account shows suspicious activity, the checks are computation - intensive and require substantial server resources

    雖然檢測產生了少量(如果帳戶顯示可疑活動,則更新少量列的) ,但檢查操作包含大量計算並需要豐富的服務器資源。
  11. They are everywhere, from plain - text databases such as the unix etc passwd file to large databases such as those that track shopping habits or fight credit card fraud

    從純文本庫(比如unix / etc / passwd文件)到大型庫(比如追蹤購物習慣或者預防信用卡庫) ,它們無處不在。
分享友人