3 views

Uploaded by niyati25

save

- What Are Outliers195
- What Are Outliers222
- What Are Outliers259
- What Are Outliers227
- What Are Outliers261
- What Are Outliers106
- What Are Outliers245
- What Are Outliers169
- What Are Outliers76
- What Are Outliers242
- WHAT ARE OUTLIERS72.pptx
- What Are Outliers168
- What Are Outliers138
- WHAT ARE OUTLIERS89.pptx
- What Are Outliers176
- Proposed Rule: Food for human consumption: Food labeling— Raw fruits, vegetables, and fish; voluntary nutrition labeling; 20 most frequently consumed raw fruits, vegetables, and fish identification
- report.pdf
- Parts of a Research
- b 05720509
- preston maths t1
- preston maths t1
- preston maths t1
- Articles Critique Format
- 1568982203
- Statistical Analysis of Restaurants in Cincinnati
- Project Report Team SAUR (2)
- A Search for Consensus Among Model Parameters Reported
- Fundamentals of Statistics - Upload
- Qa Hotel
- PEER_stage2_10.1007%252Fs00107-009-0356-7
- 4.80 SY IT
- Computer Graphics December 2010 - Old(Vtuplanet.com)
- chap 7
- 9.e
- 2 D Transformations 2
- FTKManual
- 184890998 CEH v8 Labs Module 13 Hacking Web Applications PDF
- Ieee Test Plan
- ch27.pdf
- What Are Outliers271
- Computer Graphics1
- BhavanaRam Paper
- 9.e
- Cs453 d HTML Javascript 1
- 98qwerty
- What Are Outliers263
- What Are Outliers267
- What Are Outliers264
- What Are Outliers266
- What Are Outliers262
- What Are Outliers258
- What Are Outliers272
- What Are Outliers257
- What Are Outliers255
- What Are Outliers270
- What Are Outliers269
- What Are Outliers268
- What Are Outliers260

You are on page 1of 15

• Outliers can be caused by measurement or execution error. These data objects are outliers.• A database may contain data objects that do not comply with the general behavior or model of the data. • the outliers may be of particular interest .

Applications: • Fraud detection • Medicine • Public health • Sports statistics • Detecting measurement errors .

OUTLIER DETECTION METHODS • Statistical Distribution-Based Outlier Detection • Distance-Based Outlier Detection • Density-Based Local Outlier Detection • Deviation-Based Outlier Detection .

Statistical Distribution-Based Outlier Detection • assumes a distribution for the given data set • identifies outliers with respect to the model using a discordancy test • requires knowledge of the data set parameters • knowledge of distribution parameters • expected number of outliers. .

How does the discordancy testing work? • This test examines two hypotheses: • working hypothesis • alternative hypothesis .

… . F.• A working hypothesis. H. is evaluated • If SP(vi) is small H is rejected . that is. where i = 1. n. • H : oi E F. is a statement that the entire data set of n objects comes from an initial distribution model. • Verifies whether oi is <> in relation to F • Assume T is some statistic used as discordancy test • Assume value of the statistic for object oi is vi • Then distribution T is constructed • SP(vi)=Prob(T > vi). 2.

H. G. • The result is very much dependent on which model F is chosen because oi may be an outlier under one model and a perfectly valid value under another. .• An alternative hypothesis. is adopted. which states that oi comes from another distribution model.

n • Mixture alternative distribution G. where i = 1. H : oi E (1-mu)F +muG. n. 2. : : : .• kinds of alternative distributions. • Inherent alternative distribution H’ : oi E G. • Slippage alternative distribution . 2. where i = 1. : : : .

. a DB(pct. is a distancebased (DB) outlier with parameters pct and dmin.11 that is. of the objects in D lie at a distance greater than dmin from o. o.Distance-Based Outlier Detection • An object. pct. in a data set.dmin)-outlier. if at least a fraction. D.

algorithms for mining distance-based outliers • Index-based algorithm • Nested-loop algorithm • Cell-based algorithm .

Density-Based Local Outlier Detection • Distance-based outlier detection is based on global distance distribution • It encounters difficulties to identify outliers if data is not uniformly distributed. .

Deviation-Based Outlier Detection • it identifies outliers by examining the main characteristics of objects in a group • two techniques for deviation-based outlier detection • Sequential Exception Technique • OLAP Data Cube Technique .

Sequential Exception Technique .

OLAP Data Cube Technique .

- What Are Outliers195Uploaded byniyati25
- What Are Outliers222Uploaded byniyati25
- What Are Outliers259Uploaded byniyati25
- What Are Outliers227Uploaded byniyati25
- What Are Outliers261Uploaded byniyati25
- What Are Outliers106Uploaded byniyati25
- What Are Outliers245Uploaded byniyati25
- What Are Outliers169Uploaded byniyati25
- What Are Outliers76Uploaded byniyati25
- What Are Outliers242Uploaded byniyati25
- WHAT ARE OUTLIERS72.pptxUploaded byniyati25
- What Are Outliers168Uploaded byniyati25
- What Are Outliers138Uploaded byniyati25
- WHAT ARE OUTLIERS89.pptxUploaded byniyati25
- What Are Outliers176Uploaded byniyati25
- Proposed Rule: Food for human consumption: Food labeling— Raw fruits, vegetables, and fish; voluntary nutrition labeling; 20 most frequently consumed raw fruits, vegetables, and fish identificationUploaded byJustia.com
- report.pdfUploaded byAnonymous V9ahE8qT
- Parts of a ResearchUploaded byJuliana
- b 05720509Uploaded byIOSRJEN : hard copy, certificates, Call for Papers 2013, publishing of journal
- preston maths t1Uploaded byapi-222867947
- preston maths t1Uploaded byapi-222867947
- preston maths t1Uploaded byapi-222867947
- Articles Critique FormatUploaded byMaizatulRizani
- 1568982203Uploaded byrazor_buddy03
- Statistical Analysis of Restaurants in CincinnatiUploaded byJames Bax III
- Project Report Team SAUR (2)Uploaded bySoumya Roy
- A Search for Consensus Among Model Parameters ReportedUploaded byNegar Kharmandar
- Fundamentals of Statistics - UploadUploaded byipconfigearth
- Qa HotelUploaded bytpwarren23
- PEER_stage2_10.1007%252Fs00107-009-0356-7Uploaded bydarshak444

- 4.80 SY ITUploaded byniyati25
- Computer Graphics December 2010 - Old(Vtuplanet.com)Uploaded byniyati25
- chap 7Uploaded byniyati25
- 9.eUploaded byniyati25
- 2 D Transformations 2Uploaded byniyati25
- FTKManualUploaded byniyati25
- 184890998 CEH v8 Labs Module 13 Hacking Web Applications PDFUploaded byniyati25
- Ieee Test PlanUploaded byniyati25
- ch27.pdfUploaded byniyati25
- What Are Outliers271Uploaded byniyati25
- Computer Graphics1Uploaded byniyati25
- BhavanaRam PaperUploaded byniyati25
- 9.eUploaded byniyati25
- Cs453 d HTML Javascript 1Uploaded byniyati25
- 98qwertyUploaded byniyati25
- What Are Outliers263Uploaded byniyati25
- What Are Outliers267Uploaded byniyati25
- What Are Outliers264Uploaded byniyati25
- What Are Outliers266Uploaded byniyati25
- What Are Outliers262Uploaded byniyati25
- What Are Outliers258Uploaded byniyati25
- What Are Outliers272Uploaded byniyati25
- What Are Outliers257Uploaded byniyati25
- What Are Outliers255Uploaded byniyati25
- What Are Outliers270Uploaded byniyati25
- What Are Outliers269Uploaded byniyati25
- What Are Outliers268Uploaded byniyati25
- What Are Outliers260Uploaded byniyati25