Notice of Violation of IEEE Publication Principles - the Explore of Some Cases with the Data Mining Techniques

Shen-Ming Gu,Yun Zheng,Lin-Ting Guan,Yue-Ting Zhuang
DOI: https://doi.org/10.1109/icect.2009.47
2009-01-01
Abstract:Notice of Violation of IEEE Publication Principles "The Explore of Some Cases with the Data Mining Techniques" by Shen-Ming Gu, Yun Zheng, Lin-Ting Guan, Yue-Ting Zhuang in Proceedings of the International Conference on Electronic Computer Technology, February 2009, pp. 59-63 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper duplicates substantial amounts of original text and figures from the paper cited below. The original content was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. One of the authors, Shen-Ming Gu, was responsible for the misconduct and submitted the paper without the knowledge or approval of the listed coauthors. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Data Mining Applications in BT: by R.T. Scarfe and R.J. Shortland in the IEE Colloquium on Knowledge Discovery in Databases, February 1995, pp. 5/1-5/4 With the development of the computer technology a larger of data is generated and stored and many companies become dasiadata rich and information poorpsila. This paper describes how BT has used data mining techniques to convert volume data into high-value information which can be used to aid decision making in a number of key business processes. The benefit of actively using data, as opposed to passively storing it, is demonstrated via a number of case studies which cover areas as diverse as fault diagnosis, fraud detection, market segmentation, credit vetting and litigation assessment.
What problem does this paper attempt to address?