Search Results - (( java implication based algorithm ) OR ( outlier detection techniques algorithm ))
Search alternatives:
- detection techniques »
- implication based »
- java implication »
-
1
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
2
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets
Published 2025“…In conclusion, while individual algorithms provide distinct perspectives, ensemble techniques enhance the accuracy and consistency of outlier detection. …”
Article -
5
Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model
Published 2018“…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
Get full text
Get full text
Thesis -
7
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
9
A systematic literature review on outlier detection in wireless sensor networks
Published 2020“…The current paper presents an improved taxonomy of outlier detection techniques. This will help researchers and practitioners to find the most relevant and recent studies related to outlier detection in WSNs. …”
Get full text
Get full text
Get full text
Article -
10
Modified sequential fences for identifying univariate outliers
Published 2016“…The modified sequential fences method is found can accurately detect the outliers in positively skewed distribution. …”
Get full text
Get full text
Thesis -
11
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Currently, academic literature does not really cover the topic of unsupervised machine learning techniques for anomaly detection. This paper provides an overview of the current deep learning and unsupervised machine learning techniques for anomaly detection and discusses the fundamental challenges in anomaly detection. …”
Get full text
Get full text
Article -
13
Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach
Published 2023“…The proposed technique is capable to detect the location, duration, magnitude and number of structural changes in time series data. …”
Get full text
Get full text
Thesis -
14
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
15
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
16
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
19
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
20
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article
