Fraud Detection Using Outlier Analysis: A Survey
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 6
Abstract
Outlier detection is a primary step in many data-mining applications. There are several methods for outlier detection, like univariate vs. multivariate techniques and parametric vs. nonparametric procedures. In presence of outliers, special attention should be taken to assure the robustness of the used estimators. Outlier detection for data mining isoften based on distance measures, clustering and spatial methods. An outlier is an observation (or measurement) that is different with respect to the other values contained in a given dataset. Outliers can be due to several causes. The measurement can be incorrectly observed, recorded or entered into the process computer, the observed datum can come from a different population with respect to the normal situation and thus is correctly measured but represents a rare event. An outlier is an observation that deviates so much from other observations as to arouse suspicions that is was generated by a different mechanism.
Authors and Affiliations
Vidya Mohanty
EFFICIENT XML DATA EXTRACTION USING FMADM
In now day’s data retrieval is the main focusing term in web data extraction. The process of XML data extraction in real time using search engines like Google, Ask, Bing and Yahoo etc. The RDBMS has some central methods...
Performance Analysis: Tree and Graph Based Topology Control Algorithms in Wireless Sensor Networks
A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices that use sensor for monitoring and recording the physical conditions of the environment and organizing the col...
Development of Multi-focus Image Fusion Technique using Discrete Wavelet Transform (DWT) for Digital Images
Image fusion is the process which combines information of multiple images from the same scene. The resultant fused image is a new image that have the most desirable information and characteristics of each input i...
SECURITY PROTECTION FOR MULTI OWNER FIRM
With the increasing use of digital communication the security of data or the information has been a concern. The proposed secure sharing scheme allows users to upload multiple data pieces to different clouds, maki...
STUDIES ON THE EFFECT OF SPACING OF COIR GEOTEXTILE ON LIME STABILISED QUARRY WASTE COLUMN
Stone columns are massively used ground improvement technique. Installation of stone columns enhances the load carrying capacity and accelerates consolidation and thereby reduces settlement. The lateral confin...