Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Applications and Techniques of Outlier Detection


Affiliations
1 Government Arts College, Coimbatore, India
     

   Subscribe/Renew Journal


Outlier detection plays a vital role in many data-mining applications. Noisy data is a significant problem which is being researched in diverse fields of research and application domains. Many outlier detection techniques have been developed specific to certain application domains, while some techniques are more generic. A research on crime and terrorist activities are some of the application domains are being researched with strict confidentiality. The techniques and results of such techniques are not readily forthcoming. In this paper, various outlier detection techniques are discussed in a structured and generic description. With this exercise, the researchers have attain a better understanding of the different directions of research on outlier analysis. Then, the applications of outlier detection are also screened out in a better and precise way. This paper will be useful for beginners in this research field.

Keywords

Outliers, Outlier Detection, Outlier Applications.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 255

PDF Views: 2




  • Applications and Techniques of Outlier Detection

Abstract Views: 255  |  PDF Views: 2

Authors

P. Divya
Government Arts College, Coimbatore, India
M. Devapriya
Government Arts College, Coimbatore, India

Abstract


Outlier detection plays a vital role in many data-mining applications. Noisy data is a significant problem which is being researched in diverse fields of research and application domains. Many outlier detection techniques have been developed specific to certain application domains, while some techniques are more generic. A research on crime and terrorist activities are some of the application domains are being researched with strict confidentiality. The techniques and results of such techniques are not readily forthcoming. In this paper, various outlier detection techniques are discussed in a structured and generic description. With this exercise, the researchers have attain a better understanding of the different directions of research on outlier analysis. Then, the applications of outlier detection are also screened out in a better and precise way. This paper will be useful for beginners in this research field.

Keywords


Outliers, Outlier Detection, Outlier Applications.