Difference between revisions of "...find outliers"

From
Jump to: navigation, search
Line 5: Line 5:
 
** [[Signals]]
 
** [[Signals]]
 
** [[Pathology]]
 
** [[Pathology]]
 
+
* [http://pdfs.semanticscholar.org/4c68/4a9ba057fb7e61733ff554fe2975a2c91096.pdf Outlier Detection and Removal Algorithm in K-Means and Hierarchical Clustering | A. Barai and L. Dey]
  
 
Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different.
 
Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different.
Line 15: Line 15:
 
* No, need fast training, then try [[Principal Component Analysis (PCA)]]-based Anomaly Detection
 
* No, need fast training, then try [[Principal Component Analysis (PCA)]]-based Anomaly Detection
 
* [[K-Means]] Clustering
 
* [[K-Means]] Clustering
 +
* [[Hierarchical Cluster Analysis (HCA)]]

Revision as of 08:17, 7 January 2019

Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different. _______________________________________________.

Do you have > 100 features?