Outlier Detection via online OSPCA in High Dimensional Space
P.G.K. Pabhita1 , K. Bhaskarnaik2
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-9 , Page no. 61-64, Sep-2014
Online published on Oct 04, 2014
Copyright © P.G.K. Pabhita, K. Bhaskarnaik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P.G.K. Pabhita, K. Bhaskarnaik , “Outlier Detection via online OSPCA in High Dimensional Space,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.61-64, 2014.
MLA Style Citation: P.G.K. Pabhita, K. Bhaskarnaik "Outlier Detection via online OSPCA in High Dimensional Space." International Journal of Computer Sciences and Engineering 2.9 (2014): 61-64.
APA Style Citation: P.G.K. Pabhita, K. Bhaskarnaik , (2014). Outlier Detection via online OSPCA in High Dimensional Space. International Journal of Computer Sciences and Engineering, 2(9), 61-64.
BibTex Style Citation:
@article{Pabhita_2014,
author = {P.G.K. Pabhita, K. Bhaskarnaik },
title = {Outlier Detection via online OSPCA in High Dimensional Space},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2014},
volume = {2},
Issue = {9},
month = {9},
year = {2014},
issn = {2347-2693},
pages = {61-64},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=255},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=255
TI - Outlier Detection via online OSPCA in High Dimensional Space
T2 - International Journal of Computer Sciences and Engineering
AU - P.G.K. Pabhita, K. Bhaskarnaik
PY - 2014
DA - 2014/10/04
PB - IJCSE, Indore, INDIA
SP - 61-64
IS - 9
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3570 | 3454 downloads | 3672 downloads |
Abstract
Outlier detection is the process of identifying unusual behavior. It is widely used in data mining, for example, to identify customer behavioral change, fraud and manufacturing flaws. In recent years many researchers had proposed several concepts to obtain the optimal result in detecting the anomalies. But the process of PCA made it challenging due to its computations. In order to overcome the computational complexity, online oversampling PCA has been used. The algorithm enables quick Online updating of the principal directions for the effective computation and satisfying the online detecting demand and also oversampling will improve the impact of outliers which leads to accurate detection of outliers. Experimental results show that this method is effective in computation time and need less memory requirements also clustering technique is added to it for optimization.
Key-Words / Index Term
online oversampling PCA, Online updating Technique, Outlier detection
References
[1] M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, �LOF: Identifying Density-Based Local Outliers,� Proc. ACM SIGMOD Int�l Conf. Management of Data, 2000.
[2] F. Angiulli, S. Basta, and C. Pizzuti, �Distance-Based Detection and Prediction of Outliers,� IEEE Trans. Knowledge and Data Eng., vol. 18, no. 2, pp. 145-160, 2006.
[3] N.L.D. Khoa and S. Chawla, �Robust Outlier Detection Using Commute Time and Eigen space Embedding,� Proc. Pacific-Asia Conf. Knowledge Discovery and Data Mining, 2010.
[4] V.Barnett and T. Lewis, �Outliers in Statistical Data�, John Wiley Sons, 2006.
[5] D.M. Hawkins, �Identification of Outliers�. Chapman and Hall, 1980.
[6] W. Jin, A.K.H. Tung, J. Han, and W. Wang, �Ranking Outliers Using Symmetric Neighborhood Relationship,� Proc. Pacific-Asia Conf. Knowledge Discovery and Data Mining, 2006.
[7] H.-P. Kriegel, M. Schubert, and A. Zimek, �Angle-Based Outlier Detection in High- Dimensional Data,� Proc. 14th ACM SIGKDD Int�l Conf. Knowledge Discovery and data Mining, 2008.
[8] C.C. Aggarwal and P.S. Yu, �Outlier Detection for High Dimensional Data,� Proc. ACM SIGMOD Int�l Conf. Management of Data, 2001.
[9] T. Ahmed, �Online Anomaly Detection using KDE,� Proc. IEEE Conf. Global Telecomm., 2009.
[10] X. Song, M. Wu, and C.J., and S. Ranka, �Conditional Anomaly Detection,�IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 631-645, May 2007.
[11] L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A.D. Joseph, and N. Taft, �In-Network Pca and Anomaly Detection,� Proc. Advances in Neural Information Processing Systems 19, 2007.
[12] V. Chandola, A. Banerjee, and V. Kumar, �Anomaly Detection: A Survey,� ACM Computing Surveys, vol. 41, no. 3, pp. 15:1-15:58,2009.
[13] W. Wang, X. Guan, and X. Zhang, �A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security,� Proc. Int�l sym. Neural Networks, 2004.