參考文獻 |
中文部分:
1. 中央健康保險局,專業審查不予支付理由代碼編碼說明,2001 年,1-3
2. 王復中,,健保醫療費用審查自動化之研究,國立政治大學資訊管理研究所碩士論文,2000。
3. 吳國禎,資料探索在醫學資料庫之應用,中原大學醫學工程學系,碩士論文,2000 年。
4. 林家弘,以類神經網路為基礎的輔助醫師開藥系統之探討,國立中正大學資訊管理研究所碩士論文,1998
5. 范錚強,中央健康保險局決策輔助系統之整體需求規劃,中央大學資訊管理學系,研究報告,1996 年,13-16 頁。
6. 陳彥良等,"資料間隱含關係的挖掘與展望," 二十一世紀台灣湧現中的資訊管理議題專家研討會 ,大溪,鴻禧山莊,2001。
7. 陳團景,健保醫療費用審查之標準化與制度化,全民健保醫事服務機構
8. 黃肇明,「全民健康保險抽樣審查制度」,全民健康保險,1997 年3 月,22-24 頁。
9. 藍中賢,結合模糊集合理論與貝氏分類法之資料探勘技術- 應用於健保局醫療費用審查作業,元智大學資訊研究所,2000年。
10. 醫療服務專業審查研討會會議記錄,1997 年。
網站部分:
1. 中央健保局(2002)。2002年5月6日,取自http://www.nhi.gov.tw/hospital/c_index.htm
英文部分:
1. Agarwal, R., Aggarwal C. and Prasad, V. V. V. "A tree projection algorithm for generation of frequent itemsets," In J. Parallel and Distributed Computing, 2000.
2. Agrawal, R. and Ramakrishnan S., “Mining Sequential Patterns,”Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
3. Agrawal, R. and Ramakrishnan S., “Fast Algorithms for Mining Association Rules,” Proc. of the 20th VLDB Conference Santiago, Chile, 1994.
4. Berry, M. J. A. and Linoff, G., “Data mining Technique For Marketing,Sale, and Customer Support,” Wiley Computer, 1997.
5. Brin, S., Motwani, R., Ullman, J.D. and Tsur, S. "Dynamic Itemset Counting And Implication Rules For Market Basket Data," SIMOD, 1997, pp. 255-264.
6. Cabena, P., Hadjinian, P. O., R. Stadler, DR. J. Verhees, and. Zanasi, A., “Discovering Data Mining from Concept to Implementation ,” Prentice Hall, 1997, p.12.
7. Carter, C. L. and Hamilton, H. J., "A Fast, On-Line Generalization Algorithm for Knowledge Discovery," Applied Mathematics Letters Volume: 8, Issue: 2, March, 1995, pp. 5-11
8. Chen, M., Han J. and Philip S. Yu., “Data mining: An Overview from a Database Perspective,” IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No.6, December 1996.
9. Frawley, W. J. , Paitetsky-Shapiro G. and Matheus, C. J., ”Knowledge Discovery in Database:An Overview.,” Knowledge Discovery in Database, AAAI/MIT Press,1991, p.1-30.
10. Gediga, G. and Düntsch, I. “ROUGH SETS: TOOLS FOR NON-INVASIVE DATA ANALYSIS,” 2000
11. Gediga, G. and Düntsch, I. “Roughian – Rough Information Analysis. International Journal of Intelligent Systems, 16, 121–147” ,2001
12. Golan, R. H. and Ziarko, W.,”A Mothodology for Stock Market Analysis utilizing Rough Set Theory”,IEEE 1995.
13. Grupe, F. H. and Owrang, M. M., “Data Base Mining Discovering New Knowledge and Coperative Advantage,” Information Systems Management, Vol. 12, No. 4, Fall 1995, pp. 26-31.
14. Hall, C., “The devil’s in the details: Techniques, tools, and applications for database mining and knowledge discovery—PartⅡ. ”,Intelligent Software Strategies,” Vol. XI, no.9, 1995, p.1-16.
15. Han, J. and Yin, Y., “Mining Frequent Patterms without Candidate Generatiom” Proc. 2000 ACM-SIGMOD Int. Management of Data ,1-12 ,May 2000.
16. Han, J. and Fu, Y. "Exploration of the Power of Attribute-Oriented Induction in Data Mining," U.M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (eds.), Advances in Knowledge Discovery and Data Mining, AAAI/MIT Press, 1996, pp. 399-421
17. Han, J. and Kamber, M. Data mining: Concepts and Techniques, Academic Press, 2001
18. Han, J., Cai, Y. and Cercone, N., "Data-driven discovery of quantitative rules in relational databases," Knowledge and Data Engineering, IEEE Transactions on , Volume: 5 Issue: 1 , Feb. 1993, pp. 29 –40
19. Han, J., Cai, Y. and Cercone, N., "Knowledge Discovery in Databases: An Attribute-Oriented Approach’’, Proc. of 1992 Int’’l Conf. on Very Large Data Bases (VLDB’’92), Vancouver, Canada, August 1992, pp. 547-559
20. Hu, X. and Cercone H. ,”Mining knowledge rules from databases : a rough set approach,” Data Engineering,1996.Proceedings of the Twelfth International Conference on , 1996, pp96-105.
21. Kristin, R. N., and Matkovsky, I. P., “Using Data Mining Techniques for Fraud Detection.”, SAS Institute Inc. and Federal Data Corporation, 2000.
22. LIN T. Y. and Cercone, N., “Rough Sets and Data Mining,” Copyright c 1999 Book News, Inc., Portland
23. Shusaku Tsumoto, ” Automated Discovery of Positive and Negative Knowledge in Clinical Databases,” IEEE. Engineering in Medicine and Biology, July/August 2000
24. Wyatt, J. C. “Evaluation Methods in Medical Informatics,” Springer-Verlag New York Inc. ,1997, p.303. |