Difference between revisions of "...find outliers"

From
Jump to: navigation, search
Line 1: Line 1:
 
* [[AI Solver]]  
 
* [[AI Solver]]  
 +
* [http://pdfs.semanticscholar.org/4c68/4a9ba057fb7e61733ff554fe2975a2c91096.pdf Outlier Detection and Removal Algorithm in K-Means and Hierarchical Clustering | A. Barai and L. Dey]
 
* [[Capabilities]]
 
* [[Capabilities]]
 
** [[Intruder]]
 
** [[Intruder]]
Line 5: Line 6:
 
** [[Signals]]
 
** [[Signals]]
 
** [[Pathology]]
 
** [[Pathology]]
* [http://pdfs.semanticscholar.org/4c68/4a9ba057fb7e61733ff554fe2975a2c91096.pdf Outlier Detection and Removal Algorithm in K-Means and Hierarchical Clustering | A. Barai and L. Dey]
+
 
  
 
Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different.
 
Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different.
Line 14: Line 15:
 
* Yes, then try [[One-class Support Vector Machine (SVM)]]
 
* Yes, then try [[One-class Support Vector Machine (SVM)]]
 
* No, need fast training, then try [[Principal Component Analysis (PCA)]]-based Anomaly Detection
 
* No, need fast training, then try [[Principal Component Analysis (PCA)]]-based Anomaly Detection
* [[K-Means]] Clustering
+
Also consider...
* [[Hierarchical Cluster Analysis (HCA)]]
+
** [[K-Means]] Clustering
 +
** [[Hierarchical Cluster Analysis (HCA)]]

Revision as of 08:21, 7 January 2019


Anomaly detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different. _______________________________________________.

Do you have > 100 features?

Also consider...