急求英语高手帮忙把下面的中文翻译成英文,要人工翻译,万分感谢!
目前我国学术界应用复杂网络理论对可疑交易识别的研究基本上是以交易主体和交易路径为研究对象,对可疑社团识别的研究尚未展开。然而,洗钱行为不仅是几个交易主体的孤立行为,它是一...
目前我国学术界应用复杂网络理论对可疑交易识别的研究基本上是以交易主体和交易路径为研究对象,对可疑社团识别的研究尚未展开。然而,洗钱行为不仅是几个交易主体的孤立行为,它是一群交易主体的有组织、有分工、相互配合的社团行为。
本文取得了初步的研究成果,主要进行了以下四个方面的工作。
用综合可疑度对客户全面筛选,将高于阈值的客户设定为网络的节点。然后根据节点之间的交易额、交易频率及节点的交易规模确定边权,从而形成可疑交易网络。
将某银行企业客户的真实交易数据,应用上述方法进行实验,实验结果显示改进后的算法对可疑社团的识别具有可行性。
在这种背景下,国内外的犯罪分子乘机在我国猖狂洗钱。 展开
本文取得了初步的研究成果,主要进行了以下四个方面的工作。
用综合可疑度对客户全面筛选,将高于阈值的客户设定为网络的节点。然后根据节点之间的交易额、交易频率及节点的交易规模确定边权,从而形成可疑交易网络。
将某银行企业客户的真实交易数据,应用上述方法进行实验,实验结果显示改进后的算法对可疑社团的识别具有可行性。
在这种背景下,国内外的犯罪分子乘机在我国猖狂洗钱。 展开
3个回答
展开全部
Application of the current complex network of academic theory of identification of suspicious transactions is basically trading and transaction path for the main study, identification of suspicious community has not yet commenced. However, money laundering is not only a few isolated acts of principal transactions, which is the subject of an organized group of transactions, a division of labor, mutual associations with behavior.
This preliminary research results obtained, mainly for the following four aspects.
Suspicious degree of an integrated comprehensive screening of customers, customers will be higher than the threshold set for the network nodes. Then the amount of transactions between the nodes, the transaction frequency and transaction size of nodes to determine the right side, thus forming the network of suspicious transactions.
Enterprise customers will be true of a bank transaction data, using the above method, the experiment, the experimental results indicate that the improved algorithm is feasible to identify suspicious community.
In this context, domestic and international criminals take advantage of money-laundering rampant in China.
朗读显示对应的拉丁字符的拼音
This preliminary research results obtained, mainly for the following four aspects.
Suspicious degree of an integrated comprehensive screening of customers, customers will be higher than the threshold set for the network nodes. Then the amount of transactions between the nodes, the transaction frequency and transaction size of nodes to determine the right side, thus forming the network of suspicious transactions.
Enterprise customers will be true of a bank transaction data, using the above method, the experiment, the experimental results indicate that the improved algorithm is feasible to identify suspicious community.
In this context, domestic and international criminals take advantage of money-laundering rampant in China.
朗读显示对应的拉丁字符的拼音
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
Money laundering is not separated behavior only related to trading parties; rather, it is a more organized activity with clear definition of responsibility and cooperation. apply the mentioned approach to a set of authentic client data from a certain bank to test the feasibility. By identifying clients with comprehensive credit level, we would set clients above the threshold as the network node of for suspicious trading.The test result demonstrates that the improved CNM algorithm is feasible for identifying suspicious financial transaction community.
本回答被提问者采纳
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
At present our country academia application of suspicious transactions complex network theory research is basically a transaction identification of main and trading of path as the research object, the study does not identify suspicious community unfolds. However, money laundering behavior is not only a few transaction subjects of isolation is a group of behavior, it principal transactions organised, a division of labor and cooperation community behavior. This paper made the preliminary research achievements, focused on the following four aspects of work. For customers with comprehensive suspicious degrees above the comprehensive screening, customer sets the threshold for network node. Then according to the trade volume between nodes, the frequency and scale of the transactions to determine the node right side, forming a suspicious transaction network. Will a bank enterprise customer's real exchange data, the aforementioned methods testing, experimental results show that the improved algorithm for suspected corporate recognition feasible. In this context, the domestic and foreign criminals in China's rampant flight of money laundering.
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询