A New Approach for Detecting Outliers in Data Streams
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 11
Abstract
In modern years, data streams have become an increasingly important research area, where as data stream refers to continuous flow of data and it is a process of extracting knowledge structure from continuous, rapid data records and it can be considered as a subfield of data mining. Data Stream can be classified into two types they are offline and online streams. Online data stream used in an amount of real world appliances, including network traffic monitoring, intrusion detection, credit card and fraud detection and offline data stream are used in reports based on web log streams. Data size is extremely huge and potentially infinite and it’s not possible to store all the data, so it leads to a mining challenge where shortage of limitations occurs in hardware and software. Data mining techniques are newly proposed for data streams they are highly helpful to mine the data are data stream clustering, data stream classification, frequent pattern technique, sliding window techniques and so on. For outlier detection data stream clustering technique is highly desirable one. The main objective of this research work is to perform the clustering process in data streams and detecting the outliers in data streams. Two types of clustering algorithms namely FUZZY C-MEANS and CLARANS are used for finding the outliers in data streams. The two performance factors such as clustering accuracy and outlier detection accuracy are used for analysis. By analyzing the experimental results, it is observed that the CLARANS clustering algorithm performance is more accurate than the FUZZY CMEANS.
Authors and Affiliations
Dr. S. Vijayarani*
COMPUTER SECUIRTY WITH COMPUTER PROTECTIONAND NETWORK MANAGEMENT
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them,aswellasfrom disruption or misdir...
An Eye Tracking Scheme Employing Viola-Jones and Template Matching Algorithm
The purpose of this paper is to develop a scheme to track the movement of the eyes. Most eye tracking systems employ Infrared cameras. Considering the application of our work, we are using a regular web camera to...
DISEASE DETECTION ON COTTON LEAVES AND ITS POSSIBLE SOLUTIONS
The application takes image as input and gives the related information about the disease and its possible diagnosis. Image analysis is one important method that helps segment image into objects and background. Con...
SECURE SHARING OF DATA IN CLOUD USING ATTRIBUTE BASED PROXY REENCRYPTION
People rely more on networks where security is the major issue in cloud storage. The growth of electronic personal data leads to a trend that data owners prefer to remotely outsource data to cloud for high quality...
SIMULATION OF PARABOLIC LEAF SPRING FOR HEAVY COMMERCIAL VEHICLE USING FEA
Leaf springs are special kind of spring used in automobile suspension system mostly. The automobile industry has shown increased interest in the replacement of steel spring with fiber glass composite leaf spring beca...