Pandya et al., 2022 - Google Patents
Closest fit approach for atypical value revealing and deciles range anomaly detection method for recovering misplaced value in data miningPandya et al., 2022
View PDF- Document ID
- 7411800345782678022
- Author
- Pandya D
- Modi B
- Bhavsar Nidhi S
- Publication year
- Publication venue
- International Journal of Scientific Research in Computer Science, Engineering, and Information Technology
External Links
Snippet
In identifying anomalous database values, it is currently a very active research area in the mining community. The task of identifying anomalous values is to find a small group of exceptional data objects compared to the rest of the large amount of data. The discovery of …
- 238000013459 approach 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
- G06F17/30321—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Murtagh et al. | Algorithms for hierarchical clustering: an overview, II | |
CN111143838B (en) | A method for detecting abnormal behavior of database users | |
Mercioni et al. | A survey of distance metrics in clustering data mining techniques | |
Radhwan et al. | Forecasting exchange rates: a chaos-based regression approach | |
Saad et al. | Efficient skyline computation on uncertain dimensions | |
Kanavos et al. | Clustering high-dimensional social media datasets utilizing graph mining | |
Pandya et al. | Closest fit approach for atypical value revealing and deciles range anomaly detection method for recovering misplaced value in data mining | |
Srivastava et al. | Fuzzy association rule mining for economic development indicators | |
Kennedy et al. | Impact of class imbalance on unsupervised label generation for Medicare fraud detection | |
Cabanes et al. | Unsupervised learning for analyzing the dynamic behavior of online banking fraud | |
Wu et al. | Robust graph fusion and recognition framework for fingerprint and finger‐vein | |
Kishore et al. | Applications of association rule mining algorithms in deep learning | |
Saputra et al. | Application of K-mean clustering algorithm in grouping data prospective new students | |
Gupta et al. | Security measures in data mining | |
Davidson | Visualizing clustering results | |
Deng et al. | K-DBSCAN: an efficient density-based clustering algorithm supports parallel computing | |
Saha et al. | Non-TI clustering in the context of social networks | |
Wetchapram et al. | Feature selection based on hierarchical concept model using formal concept analysis | |
Barakbah et al. | Reversed pattern of moving variance for accelerating automatic clustering | |
Basha et al. | Image forgery detection using novel copy move techniques in comparison of decision tree to predict accuracy | |
Yang et al. | Mining spatial and spatio-temporal patterns in scientific data | |
Asroni et al. | The Implementation of Clustering Method With K-Means Algorithm In Grouping Data of Students’ Course Scores at Universitas Muhammadiyah Yogyakarta | |
Pandya et al. | An Applied Variation Anomaly Technique for Detection of Irregular Values in Data Mining | |
Raja et al. | Cbt-fi: Compact bittable approach for mining frequent itemsets | |
Roychowdhury et al. | Automatic discovery of clusters by removing noisy data |