$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

대용량 자료 분석을 위한 밀도기반 이상치 탐지
Density-based Outlier Detection for Very Large Data 원문보기

한국경영과학회지 = Journal of the Korean Operations Research and Management Science Society, v.35 no.2, 2010년, pp.71 - 88  

김승 (서울산업대학교 산업공학과) ,  조남욱 (서울산업대학교산업정보시스템공학과) ,  강석호 (서울산업대학교 산업공학과)

Abstract AI-Helper 아이콘AI-Helper

A density-based outlier detection such as an LOF (Local Outlier Factor) tries to find an outlying observation by using density of its surrounding space. In spite of several advantages of a density-based outlier detection method, the computational complexity of outlier detection has been one of major...

주제어

참고문헌 (27)

  1. Aggarwal, C.C. and P.S. Yu, "Outlier detection for high dimensional data," Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data, New York: ACM Press, (2001), pp.37-46. 

  2. Agrawal, R., J. Gehrke, D. Gunopulos, and P. Raghavan, "Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications," Proceeding of the ACM SIGMOD International Conference on Management of Data, Seattle, Washington, New York: ACM Press, (1998), pp.94-105. 

  3. Agyemang, M. and C.I. Ezeife, "LSC- Mine: Algorithm for Mining Local Outliers," Proceedings of the 15th Information Resource Management Association (IRMA) International Conference, New Orleans, Hershey, PA U.S.A. : IRM press, Vol.1(2004), pp.5-8. 

  4. Arya, S., D.M. Mount, N.S. Netanyahu, R. Silverman, and A. Wu, "An optimal algo rithm for approximate nearest neighbor searching," Journal of the ACM, Vol.45, No.6 (1998), pp.891-923. 

  5. Asuncion, A. and D.J. Newman, "UCI Machine Learning Repository," [http://www.ics.uci .edu/-mlearn/MLRepository.html], Irvine, CA : University of California, School of Information and Computer Science, 2007. 

  6. Bentley, J.L., "K -d trees for semidynamic point sets," Proceedings of 6th Annual ACM Symposium Computational Geometry, New York : ACM Press, 1990, pp.187-197. 

  7. Breunig, M.M., H.P. Kriegel, R.T. Ng, and J. Sander, "LOF : Identifying Density Based Local Outliers," Proceedings of the ACM SIGMOD Conference, Dallas, Texas, New York : ACM, (2000), pp.93-104. 

  8. Ester, M.M., H.P. Kriegel, J. Sander and X. Xu, "A Density- Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise," Proceeding for 2nd International Conference on Knowledge Discovery and Data Mining(KDD '96), Portland, Oregon, AAAI Press, (1996), pp.226-231. 

  9. Ezawa, K.J. and S.W. Norton, "Constructing Bayesian Networks to predict Uncollectible Telecommunications Accounts," IEEE Expert, Vol.11, No.5(1996), pp.45-51. 

  10. Faloutsos, C. and K1. Lin, "FastMap : A fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets," Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, San Jose, California, New York: ACM Press, Vol.24, No.2(1995), pp.163-174. 

  11. Friedman, J.H., J.L. Bentley, and R.A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Transaction on Mathematical Software, Vol.3, No.3 (1977), pp.209-226. 

  12. Friedman, J,H., J.L. Bentley, and R.A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Transaction on Mathematical Software, Vol.3, No.3 (1977), pp.209-226. 

  13. Fukunaga, K., Introduction to Statistical Pattern Recognition, Academic Press, 2nd edition, 1977. 

  14. Guha, S., R. Rastogi, and K. Shim, "Cure: An Efficient Clustering Algorithm for Large Databases," Proceeding of the ACM SIGMOD International Conference on Management of Data, Seattle, Washington New York: ACM Press, (1998), pp.73-84. 

  15. Hinkley, D.V., "On the Ratio of Two Correlated Normal Random Variables," Biometrika, Vol.56, No.3(1969), pp.635-639. 

  16. Hwang, S.S., S. Cho, and S. Park, "Keystroke dynamics-based authentication for mobile devices," Computers and Security, Vol.28 (2009), pp.85-93. 

  17. Lewis, V.B., Outliers in Statistical Data, John Wiley and Sons, 1994. 

  18. MacQueen, J., "Some Methods for Classification and Analysis of Multivariate Observations," Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, University of California, Berkeley, Berkeley, Calififornia : University of California Press, (1967), pp.291-297. 

  19. Medioni, G., I. Cohen, S. Hongeng, F. Bremond, and R. Nevatia, "Event Detection and Analysis from Video Streams," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.8, No.23(2001), pp.873-889. 

  20. Pokrajac, D., A. Lazarevic, and L.J, Latecki, "Incremental Local Outlier Detection for Data Streams," IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Honolulu, Hawaii, New York IEEE Press, (2007), pp.504-515. 

  21. Press, W.H., B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling, Numerical Recipes in C, Cambridge University Press, 1988. 

  22. Ramaswamy, S., R. Rastogi, and K. Shim, Efficient algorithms for mining outliers from large data sets, Proceedings of the International Conference on Management of Data, Dallas, Texas, New York : ACM Press, (2000), pp.427-438. 

  23. Strang, G., Linear Algebra and its Applications, Academic Press, 2nd edition, 1980. 

  24. Yue, D., X. Wu, Y. Wang, Y. Li, and C.H. Chu, "A Review of Data Mining-Based Financial Fraud Detection Research," Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, PR. China, Sponsored by IEEE, (2007), pp.5514-5517. 

  25. Zhang, T., R. Ramakrishnan, and M. Livny, "Birch: An Efficient data clustering method for very large databases," Proceedings for the ACM SIGMOD Conference on Management of Data, Montreal, Canada, New York : ACM Press, (1996), pp.103-114. 

  26. Zhang, J. and M. Zulkernine, "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection," Proceedings of 2006 IEEE International Conference on Communications, Istanbul, Turkey, New York : IEEE Press, (2006), pp.2388-2393. 

  27. http://www.cs.umd.edu/-mount/ANN/Files/1.1.1/ANNmanual_1.1.1..pdf. 

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로