A Survey for Outlier Detection and its Strategies

Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detect...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced research in computer science 2015-05, Vol.6 (3)
Hauptverfasser: Nagamani, Ch, Suneetha, Ch
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 3
container_start_page
container_title International journal of advanced research in computer science
container_volume 6
creator Nagamani, Ch
Suneetha, Ch
description Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1709745548</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3722662781</sourcerecordid><originalsourceid>FETCH-LOGICAL-p618-5c7eded2fd151c4651ed028f6fe2756af96c354fde07d1656023cda490abf1f93</originalsourceid><addsrcrecordid>eNpdj81KAzEYRYMgWGrfIeDGzUAySb5MlqX-QqGLdj_E5IukjJOaH8G3d0BX3s3dHA73XpEVMxo6BUbfkE0pZ7ZEGAOSrQjf0mPLX_hNQ8r00OoUMdMHrOhqTDO1s6exFnqs2VZ8j1huyXWwU8HNX6_J6enxtHvp9ofn1912312AD51yGj36PniuuJOgOHrWDwEC9lqBDQacUDJ4ZNpzUMB64byVhtm3wIMRa3L_q73k9Nmw1PEjFofTZGdMrYxcL6-kUnJY0Lt_6Dm1PC_jRg6GCaYG4OIHl8FM8A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1690305861</pqid></control><display><type>article</type><title>A Survey for Outlier Detection and its Strategies</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nagamani, Ch ; Suneetha, Ch</creator><creatorcontrib>Nagamani, Ch ; Suneetha, Ch</creatorcontrib><description>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Clustering ; Computer science ; Credit cards ; Data analysis ; Data mining ; Fraud ; Fraud prevention ; Military ; Spamming ; Strategy</subject><ispartof>International journal of advanced research in computer science, 2015-05, Vol.6 (3)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science May 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Nagamani, Ch</creatorcontrib><creatorcontrib>Suneetha, Ch</creatorcontrib><title>A Survey for Outlier Detection and its Strategies</title><title>International journal of advanced research in computer science</title><description>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</description><subject>Clustering</subject><subject>Computer science</subject><subject>Credit cards</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Fraud</subject><subject>Fraud prevention</subject><subject>Military</subject><subject>Spamming</subject><subject>Strategy</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpdj81KAzEYRYMgWGrfIeDGzUAySb5MlqX-QqGLdj_E5IukjJOaH8G3d0BX3s3dHA73XpEVMxo6BUbfkE0pZ7ZEGAOSrQjf0mPLX_hNQ8r00OoUMdMHrOhqTDO1s6exFnqs2VZ8j1huyXWwU8HNX6_J6enxtHvp9ofn1912312AD51yGj36PniuuJOgOHrWDwEC9lqBDQacUDJ4ZNpzUMB64byVhtm3wIMRa3L_q73k9Nmw1PEjFofTZGdMrYxcL6-kUnJY0Lt_6Dm1PC_jRg6GCaYG4OIHl8FM8A</recordid><startdate>20150501</startdate><enddate>20150501</enddate><creator>Nagamani, Ch</creator><creator>Suneetha, Ch</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20150501</creationdate><title>A Survey for Outlier Detection and its Strategies</title><author>Nagamani, Ch ; Suneetha, Ch</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p618-5c7eded2fd151c4651ed028f6fe2756af96c354fde07d1656023cda490abf1f93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Clustering</topic><topic>Computer science</topic><topic>Credit cards</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Fraud</topic><topic>Fraud prevention</topic><topic>Military</topic><topic>Spamming</topic><topic>Strategy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nagamani, Ch</creatorcontrib><creatorcontrib>Suneetha, Ch</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nagamani, Ch</au><au>Suneetha, Ch</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey for Outlier Detection and its Strategies</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2015-05-01</date><risdate>2015</risdate><volume>6</volume><issue>3</issue><eissn>0976-5697</eissn><abstract>Outlier detection is the most important research problem in data mining that aims to detect outliers from high volumes of data. The Outlier detection problem has sophisticated applications in the field of Fraud detection for Credit cards, Military supervision for enemy activities, E-mail spam detection etc. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions . Most approaches use the concept of proximity in order to find outliers based on relationship to the rest of the data. But it fails when data comes with high dimensions. In order to find out those outliers, we introduce a survey of sophisticated techniques for outlier detection. In this paper, we identified a well defined mechanisms to handle outliers, their motivations and distinguish them.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 0976-5697
ispartof International journal of advanced research in computer science, 2015-05, Vol.6 (3)
issn 0976-5697
language eng
recordid cdi_proquest_miscellaneous_1709745548
source EZB-FREE-00999 freely available EZB journals
subjects Clustering
Computer science
Credit cards
Data analysis
Data mining
Fraud
Fraud prevention
Military
Spamming
Strategy
title A Survey for Outlier Detection and its Strategies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T16%3A49%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20for%20Outlier%20Detection%20and%20its%20Strategies&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Nagamani,%20Ch&rft.date=2015-05-01&rft.volume=6&rft.issue=3&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E3722662781%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1690305861&rft_id=info:pmid/&rfr_iscdi=true