{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:58:21Z","timestamp":1725868701317},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_77","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"801-812","source":"Crossref","is-referenced-by-count":0,"title":["A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing"],"prefix":"10.1007","author":[{"given":"Mu","family":"Sheng-dong","sequence":"first","affiliation":[]},{"given":"Tian","family":"Yi-xiang","sequence":"additional","affiliation":[]},{"family":"Lili","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"77_CR1","unstructured":"Xie Ping and Yin Long. Financial Theory and Governance under Network Economics [J]. Economic Research, 2001, 4: 12-16."},{"key":"77_CR2","unstructured":"Zhang Huolin. China\u2019s Security E-Commerce Development Problems and Countermeasures [J]. Finance and Computer in Southern China, 2003, 11:22-28."},{"key":"77_CR3","unstructured":"Shi Fangli & Wu Shimin. Research of Correlation between Financial Informationalization and Network Finance [J]. China\u2019s Management Informationalization, 2005, 12:39-44."},{"key":"77_CR4","unstructured":"Cai Xuefei. Brief Discussion on Internet Finance and Bank [J]. Technological Economical Market, 2007, 1:79-86."},{"key":"77_CR5","unstructured":"Liang Xun. Network Financial System Design and Realization Case Collection [M]. Beijing University Press, 2009s"},{"key":"77_CR6","unstructured":"Cui Zeyuan. Network Finance [M]. Press of Dongbei University of Finance and Economics, 2011."},{"key":"77_CR7","unstructured":"Zhang Wenxiu, Wu Weizhi, Liang Jiye, etc. Rough Set Theory and Methods [M]. Beijing: Science Press, 2003."},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Pawlak Z.Rough Sets[J].Inter J of Computer and Information Sciences,1982,11(2):341-356.","DOI":"10.1007\/BF01001956"},{"key":"77_CR9","unstructured":"Zeng Huanglin. Rough Set Theory and Applications [M]. Chongqing: Chongqing University Press,1996."},{"key":"77_CR10","doi-asserted-by":"crossref","unstructured":"Vapnik V N. The nature of statistical learning theory [M]. New York: Springer-Verlag, 1995.","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"77_CR11","unstructured":"Wen Wenbo & Du Wei. Overview of Ant Colony Algorithm [J]. Control System, 2002, (1) : 19-22."},{"key":"77_CR12","unstructured":"Van den Bergh F. An Analysis of Particle Swarm Optimizers [D]. University of Pretoria, South Africa, 2002."},{"key":"77_CR13","doi-asserted-by":"crossref","unstructured":"Jae H M, Y C L. Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters [J]. Expert Systems with Application, 2005, 28: 603~614.","DOI":"10.1016\/j.eswa.2004.12.008"},{"key":"77_CR14","doi-asserted-by":"crossref","unstructured":"C W HSU, C J LIN. A Comparison of Methods for Multi-class Support Vector Machines [J]. IEEE Transactions on Neural Networks, 2002, 13(2): 415-425.","DOI":"10.1109\/72.991427"},{"key":"77_CR15","unstructured":"R. Madala, A.G. Ivakhnenko. Inductive Learning Algorithms for Complex Systems Modeling [M]. Florida: CRC Press Inc, 1994: 69-86."},{"key":"77_CR16","unstructured":"Mueller A, Lemke F. Self-organizing data mining [M]. Herstellung Berlin: Libri Books on Demand, 2000: 63-83."},{"key":"77_CR17","unstructured":"He Changzheng. Slef-organizing Data Mining and Economic Predictions [M]. Beijing: Science Press, 2005. (In Chinese). 42-43."},{"key":"77_CR18","doi-asserted-by":"crossref","unstructured":"M.S. Sohail, B. Shanmugham. Information Sciences, 2003, 150(3-4): 207-217.","DOI":"10.1016\/S0020-0255(02)00378-X"},{"key":"77_CR19","doi-asserted-by":"crossref","unstructured":"B. Jaruwachirathanakul, D. Fink. Internet Research, 2005, 15(3): 295 \u2013 311.","DOI":"10.1108\/10662240510602708"},{"key":"77_CR20","unstructured":"International Journal of Space-Based and Situated Computing,2011 Vol. 1 No. 1 .3-17"},{"key":"77_CR21","unstructured":"Evaluation of MANET protocols for different indoor environments: results from a real MANET testbed Masahiro Hiyama; Elis Kulla; Makoto Ikeda; Leonard Barolli .DOI: 10.1504\/IJSSC.2012.047465.83-103"},{"key":"77_CR22","unstructured":"A multi-objective approach for high quality tree-based backbones in mobile ad hoc networksApivadee Piyatumrong; Pascal Bouvry; Fr\u00e9d\u00e9ric Guinand; Kittichai Lavangnananda.DOI: 10.1504\/IJSSC.2012.047466.104-111"},{"key":"77_CR23","unstructured":"Provisioning vehicular ad hoc networks with quality of serviceGongjun Yan; Danda B. Rawat; Bhed BahadurBista.DOI:10.1504\/IJSSC.2012.047467.112-122"},{"key":"77_CR24","unstructured":"Data transfer exploiting multiple heterogeneous challenged networks - implementation and applicationAkira Nagata; Shinya Yamamura; Masato Tsuru DOI: 10.1504\/IJSSC.2012.047468.123-138"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:47:15Z","timestamp":1498340835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_77","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}