Font Size: a A A

Research Of Data Mining Based On Outliers And Appliction In It Audit System

Posted on:2008-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiaoFull Text:PDF
GTID:2178360212974190Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Since 90's in last century, the calculator, network, the communication technique gets the quick development, applying the realm to also join the army the matter to change direction gradually public, with its extensive influence and strong vitalitiesare to the economic society, each one of the social activities expands to permeate. The networking also comes from the technical and widespread application of the economy management realm calculator, the communication to the challenge that the audit work bring. Currently, the economic activities the accountancy's the information of the national organization,the point business unit are electronic to have already made widely available.Especially along with connect the development of the net with each other, creation settle accounts on the electronic commerce, IT audit have already headed for the network gradually, the finance management has already broken the time space to limit, carrying out to the instantly audit organization public finance receipt and expenditure activity.Computer auditing has many unmatched predominance compared with the traditional auditing, but the study of computer auditing is right at an incipient stage in our country. The Audit the object and audit the quick development of environment variety, the operation method that requests to audit the organization must with hour to enter, replying the different audit object with the different audit. Establishing IT networking audit, and the usage of the system can raise the efficiency of audit the work, further guarding against the audit risk, the exaltation audit the quantity of the work and manage the level.First , the author gives the definition of a concept"IT audit", concludes some research hotspots on the analysis of national and international IT audit status quo.Computer auditing is the new comer in the field of auditing; it represents the trend of auditing theory as well as practice.Second, the research process and the current situation of outlier detection are reviewed. The algorithms of outlier detection based clustering, distance, density, stat.,deviation and high dimension are introduced. The content of these algorithms is analyzed. The disadvantages and advantages of these algorithms are compared.In the third chapter, based on the algorithm of based-cell outlier detection, an outlier-analysis algorithm to reduce the boundary influence is presented. The data...
Keywords/Search Tags:Outlier, Data mining, Boundary cell, Benford law
PDF Full Text Request
Related items