3 views

Uploaded by niyati25

What Are Outliers1

save

You are on page 1of 15

• Outliers can be caused by measurement or execution error.• A database may contain data objects that do not comply with the general behavior or model of the data. • the outliers may be of particular interest . These data objects are outliers.

Applications: • Fraud detection • Medicine • Public health • Sports statistics • Detecting measurement errors .

OUTLIER DETECTION METHODS • Statistical Distribution-Based Outlier Detection • Distance-Based Outlier Detection • Density-Based Local Outlier Detection • Deviation-Based Outlier Detection .

Statistical Distribution-Based Outlier Detection • assumes a distribution for the given data set • identifies outliers with respect to the model using a discordancy test • requires knowledge of the data set parameters • knowledge of distribution parameters • expected number of outliers. .

How does the discordancy testing work? • This test examines two hypotheses: • working hypothesis • alternative hypothesis .

where i = 1. n. F. is a statement that the entire data set of n objects comes from an initial distribution model. … . that is.• A working hypothesis. is evaluated • If SP(vi) is small H is rejected . • Verifies whether oi is <> in relation to F • Assume T is some statistic used as discordancy test • Assume value of the statistic for object oi is vi • Then distribution T is constructed • SP(vi)=Prob(T > vi). H. • H : oi E F. 2.

• An alternative hypothesis. G. . • The result is very much dependent on which model F is chosen because oi may be an outlier under one model and a perfectly valid value under another. H. which states that oi comes from another distribution model. is adopted.

• kinds of alternative distributions. n. n • Mixture alternative distribution G. • Slippage alternative distribution . • Inherent alternative distribution H’ : oi E G. H : oi E (1-mu)F +muG. where i = 1. : : : . where i = 1. 2. : : : . 2.

pct. o. in a data set. D. a DB(pct. of the objects in D lie at a distance greater than dmin from o.Distance-Based Outlier Detection • An object.dmin)-outlier. . is a distancebased (DB) outlier with parameters pct and dmin.11 that is. if at least a fraction.

algorithms for mining distance-based outliers • Index-based algorithm • Nested-loop algorithm • Cell-based algorithm .

.Density-Based Local Outlier Detection • Distance-based outlier detection is based on global distance distribution • It encounters difficulties to identify outliers if data is not uniformly distributed.

Deviation-Based Outlier Detection • it identifies outliers by examining the main characteristics of objects in a group • two techniques for deviation-based outlier detection • Sequential Exception Technique • OLAP Data Cube Technique .

Sequential Exception Technique .

OLAP Data Cube Technique .

- WHAT ARE OUTLIERS90.pptxUploaded byniyati25
- What Are Outliers48Uploaded byniyati25
- What Are Outliers21Uploaded byniyati25
- What Are Outliers121Uploaded byniyati25
- What Are Outliers34Uploaded byniyati25
- What Are Outliers27Uploaded byniyati25
- What Are Outliers35Uploaded byniyati25
- What Are Outliers29Uploaded byniyati25
- WHAT ARE OUTLIERS69.pptxUploaded byniyati25
- What Are Outliers37Uploaded byniyati25
- What Are Outliers130Uploaded byniyati25
- What Are Outliers38Uploaded byniyati25
- What Are Outliers43Uploaded byniyati25
- What Are Outliers58Uploaded byniyati25
- WHAT ARE OUTLIERS79.pptxUploaded byniyati25
- What Are Outliers211Uploaded byniyati25
- What Are Outliers224Uploaded byniyati25
- What Are Outliers216Uploaded byniyati25
- What Are Outliers186Uploaded byniyati25
- What Are Outliers178Uploaded byniyati25
- What Are Outliers160Uploaded byniyati25
- What Are Outliers179Uploaded byniyati25
- What Are Outliers238Uploaded byniyati25
- What Are Outliers196Uploaded byniyati25
- What Are Outliers194Uploaded byniyati25
- What Are Outliers234Uploaded byniyati25
- What Are Outliers153Uploaded byniyati25
- What Are Outliers252Uploaded byniyati25
- What Are Outliers184Uploaded byniyati25
- What Are Outliers266Uploaded byniyati25

- 184890998 CEH v8 Labs Module 13 Hacking Web Applications PDFUploaded byniyati25
- Ieee Test PlanUploaded byniyati25
- 2 D Transformations 2Uploaded byniyati25
- FTKManualUploaded byniyati25
- chap 7Uploaded byniyati25
- 9.eUploaded byniyati25
- 4.80 SY ITUploaded byniyati25
- Computer Graphics December 2010 - Old(Vtuplanet.com)Uploaded byniyati25
- 9.eUploaded byniyati25
- Cs453 d HTML Javascript 1Uploaded byniyati25
- 98qwertyUploaded byniyati25
- What Are Outliers271Uploaded byniyati25
- Computer Graphics1Uploaded byniyati25
- BhavanaRam PaperUploaded byniyati25
- ch27.pdfUploaded byniyati25
- What Are Outliers261Uploaded byniyati25
- What Are Outliers264Uploaded byniyati25
- What Are Outliers259Uploaded byniyati25
- What Are Outliers263Uploaded byniyati25
- What Are Outliers267Uploaded byniyati25
- What Are Outliers260Uploaded byniyati25
- What Are Outliers269Uploaded byniyati25
- What Are Outliers268Uploaded byniyati25
- What Are Outliers257Uploaded byniyati25
- What Are Outliers255Uploaded byniyati25
- What Are Outliers270Uploaded byniyati25
- What Are Outliers266Uploaded byniyati25
- What Are Outliers262Uploaded byniyati25
- What Are Outliers258Uploaded byniyati25
- What Are Outliers272Uploaded byniyati25