Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
- This year (0)
- Last 5 years (0)
- Last 10 years (2)
Journals and Conferences
In this thesis, we will introduce the concepts of data mining technology and customer relationship management to analyze the advantages and disadvantages of decision tree and neural network. With the… (More)
Internet fundamental security requirements include confidentiality, authentication, data integrity, and non-repudiation. To provide these security services, most network systems use public key… (More)