A Survey for Outlier Detection and its Strategies
Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detect...
Gespeichert in:
Veröffentlicht in: | International journal of advanced research in computer science 2015-05, Vol.6 (3) |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 3 |
container_start_page | |
container_title | International journal of advanced research in computer science |
container_volume | 6 |
creator | Nagamani, Ch Suneetha, Ch |
description | Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1709745548</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3722662781</sourcerecordid><originalsourceid>FETCH-LOGICAL-p618-5c7eded2fd151c4651ed028f6fe2756af96c354fde07d1656023cda490abf1f93</originalsourceid><addsrcrecordid>eNpdj81KAzEYRYMgWGrfIeDGzUAySb5MlqX-QqGLdj_E5IukjJOaH8G3d0BX3s3dHA73XpEVMxo6BUbfkE0pZ7ZEGAOSrQjf0mPLX_hNQ8r00OoUMdMHrOhqTDO1s6exFnqs2VZ8j1huyXWwU8HNX6_J6enxtHvp9ofn1912312AD51yGj36PniuuJOgOHrWDwEC9lqBDQacUDJ4ZNpzUMB64byVhtm3wIMRa3L_q73k9Nmw1PEjFofTZGdMrYxcL6-kUnJY0Lt_6Dm1PC_jRg6GCaYG4OIHl8FM8A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1690305861</pqid></control><display><type>article</type><title>A Survey for Outlier Detection and its Strategies</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nagamani, Ch ; Suneetha, Ch</creator><creatorcontrib>Nagamani, Ch ; Suneetha, Ch</creatorcontrib><description>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Clustering ; Computer science ; Credit cards ; Data analysis ; Data mining ; Fraud ; Fraud prevention ; Military ; Spamming ; Strategy</subject><ispartof>International journal of advanced research in computer science, 2015-05, Vol.6 (3)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science May 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Nagamani, Ch</creatorcontrib><creatorcontrib>Suneetha, Ch</creatorcontrib><title>A Survey for Outlier Detection and its Strategies</title><title>International journal of advanced research in computer science</title><description>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</description><subject>Clustering</subject><subject>Computer science</subject><subject>Credit cards</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Fraud</subject><subject>Fraud prevention</subject><subject>Military</subject><subject>Spamming</subject><subject>Strategy</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpdj81KAzEYRYMgWGrfIeDGzUAySb5MlqX-QqGLdj_E5IukjJOaH8G3d0BX3s3dHA73XpEVMxo6BUbfkE0pZ7ZEGAOSrQjf0mPLX_hNQ8r00OoUMdMHrOhqTDO1s6exFnqs2VZ8j1huyXWwU8HNX6_J6enxtHvp9ofn1912312AD51yGj36PniuuJOgOHrWDwEC9lqBDQacUDJ4ZNpzUMB64byVhtm3wIMRa3L_q73k9Nmw1PEjFofTZGdMrYxcL6-kUnJY0Lt_6Dm1PC_jRg6GCaYG4OIHl8FM8A</recordid><startdate>20150501</startdate><enddate>20150501</enddate><creator>Nagamani, Ch</creator><creator>Suneetha, Ch</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20150501</creationdate><title>A Survey for Outlier Detection and its Strategies</title><author>Nagamani, Ch ; Suneetha, Ch</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p618-5c7eded2fd151c4651ed028f6fe2756af96c354fde07d1656023cda490abf1f93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Clustering</topic><topic>Computer science</topic><topic>Credit cards</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Fraud</topic><topic>Fraud prevention</topic><topic>Military</topic><topic>Spamming</topic><topic>Strategy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nagamani, Ch</creatorcontrib><creatorcontrib>Suneetha, Ch</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nagamani, Ch</au><au>Suneetha, Ch</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey for Outlier Detection and its Strategies</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2015-05-01</date><risdate>2015</risdate><volume>6</volume><issue>3</issue><eissn>0976-5697</eissn><abstract>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 0976-5697 |
ispartof | International journal of advanced research in computer science, 2015-05, Vol.6 (3) |
issn | 0976-5697 |
language | eng |
recordid | cdi_proquest_miscellaneous_1709745548 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Clustering Computer science Credit cards Data analysis Data mining Fraud Fraud prevention Military Spamming Strategy |
title | A Survey for Outlier Detection and its Strategies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T16%3A49%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20for%20Outlier%20Detection%20and%20its%20Strategies&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Nagamani,%20Ch&rft.date=2015-05-01&rft.volume=6&rft.issue=3&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E3722662781%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1690305861&rft_id=info:pmid/&rfr_iscdi=true |