An Overview of the Bank Fraud and its Detection Techniques Through Data Mining Seyyed Hedayat Tarighi Nejad1 and Mohammad Nikbakht2 and Mohammad Hossein Afrakhteh2, 1Islamic Azad University, Iran and 2Keshavarzi Bank Staff Management, Iran
Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cognitive Radio Networks A. Masri1, Y. A. S. Dama1, 2, N Eya2, R. A. Abd-Alhameed2, N. Odeh1, F.Hasan1, A. Mousa1 and J. M. Noras2, 1An-Najah National University, Palestine and 2University of Bradford, UK
Business Models for the Next Generation of Mobile Communications Ghoul Smail and Jia Weijia, Shanghai Jiao Tong University, China
Investigation a New Approach to Detect and Track Fraud in Virtual Learning Environments by Using CHAYD Model Sayyed Jalalaldin Gharibi Karyak1 and Sayyed Hedayat Tarighinejad2, 1Technical and Vocational University, Iran and 2Islamic Azad University of Yasuj, Iran