楼主: yecm2000
3611 10

Handbook of data ming [推广有奖]

  • 1关注
  • 1粉丝

本科生

21%

还不是VIP/贵宾

-

威望
0
论坛币
561 个
通用积分
0
学术水平
0 点
热心指数
0 点
信用等级
0 点
经验
805 点
帖子
137
精华
0
在线时间
21 小时
注册时间
2007-3-20
最后登录
2016-4-16

相似文件 换一批

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
<P> 139205.pdf (8.83 MB, 需要: 3 个论坛币) <br></P>

[此贴子已经被作者于2007-8-2 4:19:35编辑过]

二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Data Ming handbook Book Data Hand handbook Data Ming

沙发
yecm3000 发表于 2007-7-22 07:48:00 |只看作者 |坛友微信交流群
nice book. but it is more close to computer science

使用道具

藤椅
nerni 发表于 2007-7-24 00:06:00 |只看作者 |坛友微信交流群

好书

<P>这的确是一本学习数据挖掘的好书。 </P>
<P>多谢了!。</P>

使用道具

板凳
yecm2000 发表于 2007-7-24 04:55:00 |只看作者 |坛友微信交流群
<P>The contents of this book are:</P>
<P>I: METHODOLOGIES OF DATA MINING<BR>1 Decision Trees 3<BR>Johannes Gehrke<BR>Introduction 3<BR>Problem Definition 4<BR>Classification Tree Construction 7<BR>Split Selection 7<BR>Data Access 8<BR>Tree Pruning 15<BR>Missing Values 17<BR>A Short Introduction to Regression Trees 20<BR>Problem Definition 20<BR>Split Selection 20<BR>Data Access 21<BR>Applications and Available Software 22<BR>Cataloging Sky Objects 22<BR>Decision Trees in Today’s Data Mining Tools 22<BR>Summary 22<BR>References 23<BR>2 Association Rules 25<BR>Geoffrey I. Webb<BR>Introduction 26<BR>Market Basket Analysis 26<BR>Association Rule Discovery 27<BR>The Apriori Algorithm 28<BR>The Power of the Frequent Item Set Strategy 29<BR>Measures of Interestingness 31</P>
<P>Lift 31<BR>Leverage 32<BR>Item Set Discovery 32<BR>Techniques for Frequent Item Set Discovery 33<BR>Closed Item Set Strategies 33<BR>Long Item Sets 35<BR>Sampling 35<BR>Techniques for Discovering Association Rules without Item Set Discovery 35<BR>Associations with Numeric Values 36<BR>Applications of Association Rule Discovery 36<BR>Summary 37<BR>References 38<BR>3 Artificial Neural Network Models for Data Mining 41<BR>Jennie Si, Benjamin J. Nelson, and George C. Runger<BR>Introduction to Multilayer Feedforward Networks 42<BR>Gradient Based Training Methods for MFN 43<BR>The Partial Derivatives 44<BR>Nonlinear Least Squares Methods 45<BR>Batch versus Incremental Learning 47<BR>Comparison of MFN and Other Classification Methods 47<BR>Decision Tree Methods 47<BR>Discriminant Analysis Methods 48<BR>Multiple Partition Decision Tree 49<BR>A Growing MFN 50<BR>Case Study 1—Classifying Surface Texture 52<BR>Experimental Conditions 52<BR>Quantitative Comparison Results of Classification Methods 53<BR>Closing Discussions on Case 1 55<BR>Introduction to SOM 55<BR>The SOM Algorithm 56<BR>SOM Building Blocks 57<BR>Implementation of the SOM Algorithm 58<BR>Case Study 2—Decoding Monkey’s Movement Directions from Its<BR>Cortical Activities 59<BR>Trajectory Computation from Motor Cortical Discharge Rates 60<BR>Using Data from Spiral Tasks to Train the SOM 62<BR>Using Data from Spiral and Center→Out Tasks to Train the SOM 62<BR>Average Testing Result Using the Leave-K-Out Method 63<BR>Closing Discussions on Case 2 64<BR>Final Conclusions and Discussions 65<BR>References 65<BR>4 Statistical Analysis of Normal and Abnormal Data 67<BR>Connie M. Borror<BR>Introduction 67<BR>Univariate Control Charts 68<BR>Variables Control Charts 68<BR>Attributes Control Charts 81</P>
<P>Cumulative Sum Control Charts 89<BR>Exponentially Weighted Moving Average Control Charts 93<BR>Choice of Control Charting Techniques 95<BR>Average Run Length 96<BR>Multivariate Control Charts 98<BR>Data Description 98<BR>Hotelling T2 Control Chart 98<BR>Multivariate EWMA Control Charts 101<BR>Summary 102<BR>References 102<BR>5 Bayesian Data Analysis 103<BR>David Madigan and Greg Ridgeway<BR>Introduction 104<BR>Fundamentals of Bayesian Inference 104<BR>A Simple Example 104<BR>A More Complicated Example 106<BR>Hierarchical Models and Exchangeability 109<BR>Prior Distributions in Practice 111<BR>Bayesian Model Selection and Model Averaging 113<BR>Model Selection 113<BR>Model Averaging 114<BR>Model Assessment 114<BR>Bayesian Computation 115<BR>Importance Sampling 115<BR>Markov Chain Monte Carlo (MCMC) 116<BR>An Example 117<BR>Application to Massive Data 118<BR>Importance Sampling for Analysis of Massive Data Sets 118<BR>Variational Methods 120<BR>Bayesian Modeling 121<BR>BUGS and Models of Realistic Complexity via MCMC 121<BR>Bayesian Predictive Modeling 125<BR>Bayesian Descriptive Modeling 127<BR>Available Software 128<BR>Discussion and Future Directions 128<BR>Summary 128<BR>Acknowledgments 129<BR>References 129<BR>6 Hidden Markov Processes and Sequential Pattern Mining 133<BR>Steven L. Scott<BR>Introduction to Hidden Markov Models 134<BR>Parameter Estimation in the Presence of Missing Data 136<BR>The EM Algorithm 136<BR>MCMC Data Augmentation 138<BR>Missing Data Summary 140<BR>Local Computation 140<BR>The Likelihood Recursion 140</P>
<P>The Forward-Backward Recursions 141<BR>The Viterbi Algorithm 142<BR>Understanding the Recursions 143<BR>A Numerical Example Illustrating the Recursions 143<BR>Illustrative Examples and Applications 144<BR>Fetal Lamb Movements 144<BR>The Business Cycle 150<BR>HMM Stationary and Predictive Distributions 153<BR>Stationary Distribution of dt 153<BR>Predictive Distributions 154<BR>Posterior Covariance of h 154<BR>Available Software 154<BR>Summary 154<BR>References 155<BR>7 Strategies and Methods for Prediction 159<BR>Greg Ridgeway<BR>Introduction to the Prediction Problem 160<BR>Guiding Examples 160<BR>Prediction Model Components 161<BR>Loss Functions—What We are Trying to Accomplish 162<BR>Common Regression Loss Functions 162<BR>Common Classification Loss Functions 163<BR>Cox Loss Function for Survival Data 166<BR>Linear Models 167<BR>Linear Regression 168<BR>Classification 169<BR>Generalized Linear Model 172<BR>Nonlinear Models 174<BR>Nearest Neighbor and Kernel Methods 174<BR>Tree Models 177<BR>Smoothing, Basis Expansions, and Additive Models 179<BR>Neural Networks 182<BR>Support Vector Machines 183<BR>Boosting 185<BR>Availability of Software 188<BR>Summary 189<BR>References 190<BR>8 Principal Components and Factor Analysis 193<BR>Daniel W. Apley<BR>Introduction 194<BR>Examples of Variation Patterns in Correlated Multivariate Data 194<BR>Overview of Methods for Identifying Variation Patterns 197<BR>Representation and Illustration of Variation Patterns in Multivariate Data 197<BR>Principal Components Analysis 198<BR>Definition of Principal Components 199<BR>Using Principal Components as Estimates of the Variation Patterns 199</P>
<P>Factor Rotation 202<BR>Capabilities and Limitations of PCA 202<BR>Methods for Factor Rotation 203<BR>Blind Source Separation 205<BR>The Classic Blind Source Separation Problem 205<BR>Blind Separation Principles 206<BR>Fourth-Order Blind Separation Methods 208<BR>Additional Manufacturing Applications 211<BR>Available Software 211<BR>Summary 212<BR>References 212<BR>9 Psychometric Methods of Latent Variable Modeling 215<BR>Edward Ip, Igor Cadez, and Padhraic Smyth<BR>Introduction 216<BR>Basic Latent Variable Models 217<BR>The Basic Latent Class Model 217<BR>The Basic Finite Mixture Model 221<BR>The Basic Latent Trait Model 224<BR>The Basic Factor Analytic Model 226<BR>Common Structure 229<BR>Extension for Data Mining 229<BR>Extending the Basic Latent Class Model 229<BR>Extending the Basic Mixture Model 232<BR>Extending the Latent Trait Model 233<BR>Extending the Factor Analytic Model 234<BR>An Illustrative Example 236<BR>Hierarchical Structure in Transaction Data 236<BR>Individualized Mixture Models 237<BR>Data Sets 238<BR>Experimental Results 238<BR>References and Tools 241<BR>References 241<BR>Tools 243<BR>Summary 244<BR>References 244<BR>10 Scalable Clustering 247<BR>Joydeep Ghosh<BR>Introduction 248<BR>Clustering Techniques: A Brief Survey 249<BR>Partitional Methods 250<BR>Hierarchical Methods 255<BR>Discriminative versus Generative Models 256<BR>Assessment of Results 256<BR>Visualization of Results 258<BR>Clustering Challenges in Data Mining 259<BR>Transactional Data Analysis 259</P>
<P>Next Generation Clickstream Clustering 260<BR>Clustering Coupled Sequences 261<BR>Large Scale Remote Sensing 261<BR>Scalable Clustering for Data Mining 262<BR>Scalability to Large Number of Records or Patterns, N 262<BR>Scalability to Large Number of Attributes or Dimensions, d 264<BR>Balanced Clustering 266<BR>Sequence Clustering Techniques 266<BR>Case Study: Similarity Based Clustering of Market Baskets and Web Logs 267<BR>Case Study: Impact of Similarity Measures on Web Document Clustering 270<BR>Similarity Measures: A Sampler 270<BR>Clustering Algorithms and Text Data Sets 272<BR>Comparative Results 273<BR>Clustering Software 274<BR>Summary 274<BR>Acknowledgments 274<BR>References 275<BR>11 Time Series Similarity and Indexing 279<BR>Gautam Das and Dimitrios Gunopulos<BR>Introduction 279<BR>Time Series Similarity Measures 281<BR>Euclidean Distances and L p Norms 281<BR>Normalization Transformations 282<BR>General Transformations 282<BR>Dynamic Time Warping 283<BR>Longest Common Subsequence Similarity 284<BR>Piecewise Linear Representations 287<BR>Probabilistic Methods 288<BR>Other Similarity Measures 288<BR>Indexing Techniques for Time Series 289<BR>Indexing Time Series When the Distance Function Is a Metric 290<BR>A Survey of Dimensionality Reduction Techniques 292<BR>Similar Time-Series Retrieval When the Distance Function Is Not a Metric 299<BR>Subsequence Retrieval 301<BR>Summary 302<BR>References 302<BR>12 Nonlinear Time Series Analysis 305<BR>Ying-Cheng Lai, Zonghua Liu, Nong Ye, and Tolga Yalcinkaya<BR>Introduction 305<BR>Embedding Method for Chaotic Time Series Analysis 307<BR>Reconstruction of Phase Space 307<BR>Computation of Dimension 309<BR>Detection of Unstable Periodic Orbits 311<BR>Computing Lyapunov Exponents from Time Series 317<BR>Time-Frequency Analysis of Time Series 323<BR>Analytic Signals and Hilbert Transform 324<BR>Method of EMD 331</P>
<P>Summary 338<BR>Acknowledgment 338<BR>References 338<BR>13 Distributed Data Mining 341<BR>Byung-Hoon Park and Hillol Kargupta<BR>Introduction 342<BR>Related Research 343<BR>Data Distribution and Preprocessing 344<BR>Homogeneous/Heterogeneous Data Scenarios 345<BR>Data Preprocessing 345<BR>Distributed Data Mining Algorithms 346<BR>Distributed Classifier Learning 346<BR>Collective Data Mining 349<BR>Distributed Association Rule Mining 350<BR>Distributed Clustering 351<BR>Privacy Preserving Distributed Data Mining 352<BR>Other DDM Algorithms 353<BR>Distributed Data Mining Systems 353<BR>Architectural Issues 354<BR>Communication Models in DDM Systems 356<BR>Components Maintenance 356<BR>Future Directions 357<BR>References 358<BR>II: MANAGEMENT OF DATA MINING<BR>14 Data Collection, Preparation, Quality, and Visualization 365<BR>Dorian Pyle<BR>Introduction 366<BR>How Data Relates to Data Mining 366<BR>The “10 Commandments” of Data Mining 368<BR>What You Need to Know about Algorithms Before Preparing Data 369<BR>Why Data Needs to be Prepared Before Mining It 370<BR>Data Collection 370<BR>Choosing the Right Data 370<BR>Assembling the Data Set 371<BR>Assaying the Data Set 372<BR>Assessing the Effect of Missing Values 373<BR>Data Preparation 374<BR>Why Data Needs Preparing: The Business Case 374<BR>Missing Values 375<BR>Representing Time: Absolute, Relative, and Cyclic 376<BR>Outliers and Distribution Normalization 377<BR>Ranges and Normalization 378<BR>Numbers and Categories 379<BR>Data Quality 380<BR>What Is Quality? 382<BR>Enforcing Quality: Advantages and Disadvantages 384<BR>Data Quality and Model Quality 384</P>
<P>Data Visualization 384<BR>Seeing Is Believing 385<BR>Absolute Versus Relative Visualization 388<BR>Visualizing Multiple Interactions 391<BR>Summary 391<BR>15 Data Storage and Management 393<BR>Tong (Teresa) Wu and Xiangyang (Sean) Li<BR>Introduction 393<BR>Text Files and Spreadsheets 395<BR>Text Files for Data 395<BR>Spreadsheet Files 395<BR>Database Systems 397<BR>Historical Databases 397<BR>Relational Database 398<BR>Object-Oriented Database 399<BR>Advanced Topics in Data Storage and Management 402<BR>OLAP 402<BR>Data Warehouse 403<BR>Distributed Databases 404<BR>Available Software 406<BR>Summary 406<BR>Acknowledgments 407<BR>References 407<BR>16 Feature Extraction, Selection, and Construction 409<BR>Huan Liu, Lei Yu, and Hiroshi Motoda<BR>Introduction 410<BR>Feature Extraction 411<BR>Concepts 411<BR>Algorithms 412<BR>An Example 413<BR>Summary 413<BR>Feature Selection 414<BR>Concepts 414<BR>Algorithm 415<BR>An Example 416<BR>Summary 417<BR>Feature Construction 417<BR>Concepts 417<BR>Algorithms and Examples 418<BR>Summary 419<BR>Some Applications 420<BR>Summary 421<BR>References 422<BR>17 Performance Analysis and Evaluation 425<BR>Sholom M. Weiss and Tong Zhang<BR>Overview of Evaluation 426<BR>Training versus Testing 426</P>
<P>Measuring Error 427<BR>Error Measurement 427<BR>Error from Regression 428<BR>Error from Classification 429<BR>Error from Conditional Density Estimation 429<BR>Accuracy 430<BR>False Positives and Negatives 430<BR>Precision, Recall, and the F Measure 430<BR>Sensitivity and Specificity 431<BR>Confusion Tables 431<BR>ROC Curves 432<BR>Lift Curves 432<BR>Clustering Performance: Unlabeled Data 432<BR>Estimating Error 433<BR>Independent Test Cases 433<BR>Significance Testing 433<BR>Resampling and Cross-Validation 435<BR>Bootstrap 436<BR>Time Series 437<BR>Estimating Cost and Risk 437<BR>Other Attributes of Performance 438<BR>Training Time 438<BR>Application Time 438<BR>Interpretability 438<BR>Expert Evaluation 439<BR>Field Testing 439<BR>Cost of Obtaining Labeled Data 439<BR>References 439<BR>18 Security and Privacy 441<BR>Chris Clifton<BR>Introduction: Why There Are Security and Privacy Issues with Data Mining 441<BR>Detailed Problem Analysis, Solutions, and Ongoing Research 442<BR>Privacy of Individual Data 442<BR>Fear of What Others May Find in Otherwise Releasable Data 448<BR>Summary 451<BR>References 451<BR>19 Emerging Standards and Interfaces 453<BR>Robert Grossman, Mark Hornick, and Gregor Meyer<BR>Introduction 453<BR>XML Standards 454<BR>XML for Data Mining Models 454<BR>XML for Data Mining Metadata 456<BR>APIs 456<BR>SQL APIs 456<BR>Java APIs 457<BR>OLE DB APIs 457</P>
<P>Web Standards 457<BR>Semantic Web 457<BR>Data Web 458<BR>Other Web Services 458<BR>Process Standards 458<BR>Relationships 458<BR>Summary 459<BR>References 459<BR>III: APPLICATIONS OF DATA MINING<BR>20 Mining Human Performance Data 463<BR>David A. Nembhard<BR>Introduction and Overview 463<BR>Mining for Organizational Learning 464<BR>Methods 464<BR>Individual Learning 467<BR>Data on Individual Learning 468<BR>Methods 468<BR>Individual Forgetting 474<BR>Distributions and Patterns of Individual Performance 474<BR>Other Areas 476<BR>Privacy Issues for Human Performance Data 477<BR>References 477<BR>21 Mining Text Data 481<BR>Ronen Feldman<BR>Introduction 482<BR>Architecture of Text Mining Systems 483<BR>Statistical Tagging 485<BR>Text Categorization 485<BR>Term Extraction 489<BR>Semantic Tagging 489<BR>DIAL 491<BR>Development of IE Rules 493<BR>Auditing Environment 499<BR>Structural Tagging 500<BR>Given 500<BR>Find 500<BR>Taxonomy Construction 501<BR>Implementation Issues of Text Mining 505<BR>Soft Matching 505<BR>Temporal Resolution 506<BR>Anaphora Resolution 506<BR>To Parse or Not to Parse? 507<BR>Database Connectivity 507<BR>Visualizations and Analytics for Text Mining 508<BR>Definitions and Notations 508<BR>Category Connection Maps 509</P>
<P>Relationship Maps 510<BR>Trend Graphs 516<BR>Summary 516<BR>References 517<BR>22 Mining Geospatial Data 519<BR>Shashi Shekhar and Ranga Raju Vatsavai<BR>Introduction 520<BR>Spatial Outlier Detection Techniques 521<BR>Illustrative Examples and Application Domains 521<BR>Tests for Detecting Spatial Outliers 522<BR>Solution Procedures 525<BR>Spatial Colocation Rules 525<BR>Illustrative Application Domains 526<BR>Colocation Rule Approaches 527<BR>Solution Procedures 530<BR>Location Prediction 530<BR>An Illustrative Application Domain 530<BR>Problem Formulation 532<BR>Modeling Spatial Dependencies Using the SAR and MRF Models 533<BR>Logistic SAR 534<BR>MRF Based Bayesian Classifiers 535<BR>Clustering 537<BR>Categories of Clustering Algorithms 539<BR>K-Medoid: An Algorithm for Clustering 540<BR>Clustering, Mixture Analysis, and the EM Algorithm 541<BR>Summary 544<BR>Acknowledgments 545<BR>References 545<BR>23 Mining Science and Engineering Data 549<BR>Chandrika Kamath<BR>Introduction 550<BR>Motivation for Mining Scientific Data 551<BR>Data Mining Examples in Science and Engineering 552<BR>Data Mining in Astronomy 552<BR>Data Mining in Earth Sciences 555<BR>Data Mining in Medical Imaging 557<BR>Data Mining in Nondestructive Testing 557<BR>Data Mining in Security and Surveillance 558<BR>Data Mining in Simulation Data 558<BR>Other Applications of Scientific Data Mining 561<BR>Common Challenges in Mining Scientific Data 561<BR>Potential Solutions to Some Common Problems 562<BR>Data Registration 564<BR>De-Noising Data 565<BR>Object Identification 566<BR>Dimensionality Reduction 567<BR>Generating a Good Training Set 568<BR>Software for Scientific Data Mining 568</P>
<P>Summary 569<BR>References 569<BR>24 Mining Data in Bioinformatics 573<BR>Mohammed J. Zaki<BR>Introduction 574<BR>Background 574<BR>Basic Molecular Biology 574<BR>Mining Methods in Protein Structure Prediction 575<BR>Mining Protein Contact Maps 577<BR>Classifying Contacts Versus Noncontacts 578<BR>Mining Methodology 578<BR>How Much Information Is There in Amino Acids Alone? 581<BR>Using Local Structures for Contact Prediction 582<BR>Characterizing Physical, Protein-Like Contact Maps 587<BR>Generating a Database of Protein-Like Structures 588<BR>Mining Dense Patterns in Contact Maps 589<BR>Pruning and Integration 590<BR>Experimental Results 591<BR>Future Directions for Contact Map Mining 593<BR>Heuristic Rules for “Physicality” 593<BR>Rules for Pathways in Contact Map Space 594<BR>Summary 595<BR>References 596<BR>25 Mining Customer Relationship Management (CRM) Data 597<BR>Robert Cooley<BR>Introduction 597<BR>Data Sources 599<BR>Data Types 599<BR>E-Commerce Data 601<BR>Data Preparation 604<BR>Data Aggregation 605<BR>Feature Preparation 607<BR>Pattern Discovery 608<BR>Pattern Analysis and Deployment 610<BR>Robustness 610<BR>Interestingness 611<BR>Deployment 611<BR>Sample Business Problems 612<BR>Strategic Questions 612<BR>Operational Questions 613<BR>Summary 615<BR>References 616<BR>26 Mining Computer and Network Security Data 617<BR>Nong Ye<BR>Introduction 618<BR>Intrusive Activities and System Activity Data 618</P>
<P>Phases of Intrusions 619<BR>Data of System Activities 620<BR>Extraction and Representation of Activity Features for Intrusion Detection 623<BR>Features of System Activities 624<BR>Feature Representation 625<BR>Existing Intrusion Detection Techniques 628<BR>Application of Statistical Anomaly Detection Techniques to Intrusion<BR>Detection 629<BR>Hotelling’s T 2 Test and Chi-Square Distance Test 629<BR>Data Source and Representation 631<BR>Application of Hotelling’s T 2 Test and Chi-Square Distance Test 633<BR>Testing Performance 633<BR>Summary 634<BR>References 635<BR>27 Mining Image Data 637<BR>Chabane Djeraba and Gregory Fernandez<BR>Introduction 637<BR>Related Works 639<BR>Method 641<BR>How to Discover the Number of Clusters: k 641<BR>K-Automatic Discovery Algorithm 644<BR>Clustering Algorithm 646<BR>Experimental Results 646<BR>Data Sets 647<BR>Data Item Representation 648<BR>Evaluation Method 649<BR>Results and Analysis 650<BR>Summary 654<BR>References 655<BR>28 Mining Manufacturing Quality Data 657<BR>Murat C. Testik and George C. Runger<BR>Introduction 657<BR>Multivariate Control Charts 658<BR>Hotelling T 2 Control Charts 658<BR>MEWMA Charts 660<BR>Nonparametric Properties of the MEWMA Control Charts 663<BR>Summary 667<BR>References 668<BR>Author Index 669<BR>Subject Index 681</P>

使用道具

报纸
bosstobe 发表于 2007-7-28 23:11:00 |只看作者 |坛友微信交流群
好像看过,不过还是支持一下

使用道具

地板
zhaoying33 发表于 2007-7-30 10:33:00 |只看作者 |坛友微信交流群
好啊

使用道具

7
sas_user2007 发表于 2007-8-1 03:27:00 |只看作者 |坛友微信交流群
good

使用道具

8
m8843620 发表于 2011-5-25 11:56:39 |只看作者 |坛友微信交流群
謝謝樓主的分享

使用道具

9
huazhiyu1981 发表于 2011-5-26 10:41:30 |只看作者 |坛友微信交流群
支持一下,谢谢分享!!!!

使用道具

10
dream_xin 发表于 2011-12-10 08:08:45 |只看作者 |坛友微信交流群
Thanks for sharing. Will learn it.

使用道具

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注cda
拉您进交流群

京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明   免责及隐私声明

GMT+8, 2024-5-21 14:31