18 results on '"LOF"'
Search Results
2. Effectiveness of LOF, iForest and OCSVM in detecting anomalies in stream sediment geochemical data.
- Author
-
Shahrestani, Shahed and Carranza, Emmanuel John M.
- Subjects
HYDROTHERMAL deposits ,COPPER ,PRINCIPAL components analysis ,SUPPORT vector machines ,MACHINE learning - Abstract
This paper compares three unsupervised machine-learning algorithms – local outlier factor (LOF), Isolation Forest (iForest) and one-class support vector machine (OCSVM) – for anomaly detection in a multivariate geochemical dataset in northeastern Iran. This area contains several Au, Cu and Pb–Zn mineral occurrences. The methodology incorporates single-element geochemistry, multivariate data analysis and application of the three unsupervised machine-learning algorithms. Principal component analysis unveiled diverse elemental associations for the first seven principal components (PCs): PC1 shows a Co–Cr–Ni–V–Sn association indicating a lithological influence; PC2 shows a Au–Bi–Cu–W association suggesting epithermal Au mineralization; PC3 shows variability in Zn–V–Co–Sb–Cu–Cr; PC4 shows a Au–Cu–Ba–Sr–Ag association indicating Au and polymetallic mineralization; PC5 reflects Zn–Ag–Ni–Pb related to hydrothermal mineralization; and PC6 and PC7 show element associations suggesting epithermal and intrusive-related polymetallic mineralization. It was found that OCSVM performed slightly better than LOF and iForest in detecting anomalies associated with known Cu occurrences, and it successfully delineated dispersion from all known Au occurrences. LOF outperformed iForest and OCSVM in identifying all four Pb–Zn occurrences, and the three methods substantially limited the areas of the anomaly class. The analysis showed that LOF produced a less cluttered anomaly map compared to the isolated patterns in the iForest map. LOF was accurate in identifying anomalies associated with Au–Pb mineralization, while iForest detected anomalies associated with Pb–Zn–Cu occurrences and neighbouring Pb–Zn occurrence. OCSVM performed similarly in the northern and western areas but displayed unique discrepancies in the SE and west by detecting anomalies associated with two Cu occurrences and a Pb–Cu occurrence. This study examined the influence of contamination fraction on detection of geochemical anomalies, revealing a noteworthy rise in the count of mineral occurrences delineated by anomalies when the contamination fraction increases from 5 to 10%. However, even with a 35% contamination fraction, some Cu occurrences remained outside the anomaly category, indicating potentially overlooked geochemical signals from mineral occurrences due to sampling schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Ensemble of Local Decision Trees for Anomaly Detection in Mixed Data
- Author
-
Aryal, Sunil, Wells, Jonathan R., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Oliver, Nuria, editor, Pérez-Cruz, Fernando, editor, Kramer, Stefan, editor, Read, Jesse, editor, and Lozano, Jose A., editor
- Published
- 2021
- Full Text
- View/download PDF
4. Little data is often enough for distance-based outlier detection.
- Author
-
Muhr, David and Affenzeller, Michael
- Subjects
OUTLIER detection - Published
- 2022
- Full Text
- View/download PDF
5. Assessing Data Anomaly Detection Algorithms in Power Internet of Things
- Author
-
Wang, Zixiang, Liu, Zhoubin, Yuan, Xiaolu, Xu, Yueshen, Li, Rui, Akan, Ozgur, Series Editor, Bellavista, Paolo, Series Editor, Cao, Jiannong, Series Editor, Coulson, Geoffrey, Series Editor, Dressler, Falko, Series Editor, Ferrari, Domenico, Series Editor, Gerla, Mario, Series Editor, Kobayashi, Hisashi, Series Editor, Palazzo, Sergio, Series Editor, Sahni, Sartaj, Series Editor, Shen, Xuemin (Sherman), Series Editor, Stan, Mircea, Series Editor, Xiaohua, Jia, Series Editor, Zomaya, Albert Y., Series Editor, Gao, Honghao, editor, Wang, Xinheng, editor, Yin, Yuyu, editor, and Iqbal, Muddesar, editor
- Published
- 2019
- Full Text
- View/download PDF
6. Singular Outliers: Finding Common Observations with an Uncommon Feature
- Author
-
Pijnenburg, Mark, Kowalczyk, Wojtek, Barbosa, Simone Diniz Junqueira, Series Editor, Chen, Phoebe, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Medina, Jesús, editor, Ojeda-Aciego, Manuel, editor, Verdegay, José Luis, editor, Perfilieva, Irina, editor, Bouchon-Meunier, Bernadette, editor, and Yager, Ronald R., editor
- Published
- 2018
- Full Text
- View/download PDF
7. ELOF: fast and memory-efficient anomaly detection algorithm in data streams.
- Author
-
Yang, Yun, Chen, Liang, and Fan, ChongJun
- Abstract
Anomaly detection in multivariate data is an import research field. Many studies have been proposed aiming to develop the local outlier factor (LOF). However, the existing LOF-based models have two major problems: (1) need a large amount of memory to store data; (2) unsatisfactory detection results in high-dimensional data. To this end, we propose a new data streams anomaly detection algorithm extract local outlier factor (ELOF). To reduce data storage, we first design a memory window mechanism to limit the amount of data storage; then, we design a new sub-data extraction model to extract the sub-data of the original data information. Through these two designs, the amount of data storage can be effectively reduced. Moreover, the model framework is based on the density discriminant method, and it can be widely applied to different real scenarios without any prior information or assumptions of data distribution. The final comprehensive experimental results show that the ELOF model has a great improvement than many common models in terms of accuracy. Furthermore, the running time of ELOF algorithm is less than 1% of the original LOF algorithm under the same data set. These results indicate that the ELOF improved model consumes less memory in real-time data streams anomaly detection and works better in high-dimensional data streams detection. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. A self-supervised anomaly detection algorithm with interpretability.
- Author
-
Wu, Zhichao, Yang, Xin, Wei, Xiaopeng, Yuan, Peijun, Zhang, Yuanping, and Bai, Jianming
- Subjects
- *
FEATURE extraction , *INSURANCE companies , *ALGORITHMS , *SUPERVISED learning , *FEATURE selection , *DATABASES - Abstract
Identifying the abnormal samples from a data set and determining their type are two key tasks of anomaly detection. However, the existing anomaly detection algorithms are generally faced with the defects of weak generalization ability and insufficient interpretation, the core reason of which is that they cannot mine specific features for different abnormal types. In this paper, a new anomaly detection algorithm aiming at feature selection for different abnormal types is developed. Inspired by self-supervised learning, we take the stationarity of variance changes of abnormal score similarity as a pretext task and combine it with wrapped search method. Then, the features and the corresponding parameters for different abnormal types can be screened to apply to the downstream task of anomaly integration detection. To verify the efficiency of the new algorithm, we conduct two sets of experiments to compare the new algorithm with 11 classical anomaly detection and 3 clustering anomaly detection algorithms on the data sets WDBC, WPBC and Wilt from DAMI database with the evaluation measures P@n , Adj- P@n , AP, Adj-AP and AUC. The experiment results show that, both in the identification and classification on abnormal samples, all performance measures of the new algorithm are explicitly better than that of the contrastive algorithms. Also, we apply the new algorithm to the Chinese auto insurance market, and find that the results can help managers to identify the main patterns of fraudulent claims and to summarize the feature combinations of fraud behaviors. In general, the new algorithm developed in this paper has the following advantages compared with traditional algorithms: 1) It can directly capture abnormal features and realize effective recognition of abnormal types, which effectively bridge the gap between abnormal judgement and feature screening. 2) Automatic screening of abnormal features can be completed under the condition of self-updating learning optimal strategy. 3) Only a few features are extracted from all features to reveal the abnormal characteristics, which significantly improves the interpretability and generalization ability of the algorithm and its results. In a word, through the novel self-supervised design method, feature screening is skillfully integrated into the anomaly detection task, which may provide a new way for anomaly detection research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. An Evaluation of Intrusion Detection System on Jubatus
- Author
-
Ogino, Tadashi, Kacprzyk, Janusz, Series editor, Selvaraj, Henry, editor, Zydek, Dawid, editor, and Chmaj, Grzegorz, editor
- Published
- 2015
- Full Text
- View/download PDF
10. Event Detection in Marine Time Series Data
- Author
-
Oehmcke, Stefan, Zielinski, Oliver, Kramer, Oliver, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Hölldobler, Steffen, editor, Peñaloza, Rafael, editor, and Rudolph, Sebastian, editor
- Published
- 2015
- Full Text
- View/download PDF
11. Outlier detection score based on ordered distance difference.
- Author
-
Buthong, Nattorn, Luangsodsai, Arthorn, and Sinapiromsaran, Krung
- Abstract
Outlier Detection is one of the most important topics in data mining and knowledge discovery in databases. It is to find a methodology to detect instances in a dataset that do not conform to the rest of the dataset. Local Outlier Factor is one of the earlier outlier detection score. In this paper, we propose a new approach for parameter-free outlier detection algorithm to compute Ordered Distance Difference Outlier Factor. We formulate a new outlier score for each instance by considering the difference of ordered distances. Then, we use this value to compute an outlier score. We use a score of each instance to provide a degree of outlier and compare it with LOF. Our algorithm can produce OOF in Θ (n2) without parameter. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
12. Detecting abnormal DNS traffic using unsupervised machine learning
- Author
-
Bruno Qu'hen, Abdelmalek Benzekri, Thi Quynh Nguyen, Romain Laborde, Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, MODIS Toulouse, Université Toulouse III - Paul Sabatier (UT3), and IEEE Communications Society
- Subjects
DBSCAN ,Clustering algorithms ,Computer science ,02 engineering and technology ,Intrusion detection system ,Anomaly detection ,computer.software_genre ,k-nearest neighbors algorithm ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,C&C ,0202 electrical engineering, electronic engineering, information engineering ,GMM ,K-means ,LOF ,Local outlier factor ,020206 networking & telecommunications ,DNS tunneling ,Mixture model ,Ranking ,Unsupervised learning ,020201 artificial intelligence & image processing ,Data mining ,Noise (video) ,computer - Abstract
International audience; Nowadays, complex attacks like Advanced Persistent Threats (APTs) often use tunneling techniques to avoid being detected by security systems like Intrusion Detection System (IDS), Security Event Information Management (SIEMs) or firewalls. Companies try to identify these APTs by defining rules on their intrusion detection system, but it is a hard task that requires a lot of time and effort. In this study, we compare the performance of four unsupervised machine-learning algorithms: K-means, Gaussian Mixture Model (GMM), Density-Based Spatial Clustering of Applications with Noise (DBSCAN), and Local Outlier Factor (LOF) on the Boss of the SOC Dataset Version 1 (Botsv1) dataset of the Splunk project to detect malicious DNS traffics. Then we propose an approach that combines DBSCAN and K Nearest Neighbor (KNN) to achieve 100% detection rate and between 1.6% and 2.3% false-positive rate. A simple post-analysis consisting in ranking the IP addresses according to the number of requests or volume of bytes sent determines the infected machines.
- Published
- 2020
- Full Text
- View/download PDF
13. Exploration of Outliers in If-Then Rule-Based Knowledge Bases
- Author
-
Czesław Horyń and Agnieszka Nowak-Brzezińska
- Subjects
Computer science ,General Physics and Astronomy ,lcsh:Astrophysics ,02 engineering and technology ,computer.software_genre ,Article ,SMALLCLUSTERS ,COF ,lcsh:QB460-466 ,0202 electrical engineering, electronic engineering, information engineering ,SMALL CLUSTERS ,Cluster analysis ,lcsh:Science ,LOF ,Complex data type ,Local outlier factor ,k-means clustering ,020206 networking & telecommunications ,cluster validity ,lcsh:QC1-999 ,K-MEANS ,rule-based knowledge base ,Subject-matter expert ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,ComputingMethodologies_PATTERNRECOGNITION ,data clustering ,Outlier ,outliers detection ,AHC ,Domain knowledge ,020201 artificial intelligence & image processing ,Anomaly detection ,lcsh:Q ,Data mining ,computer ,lcsh:Physics - Abstract
The article presents both methods of clustering and outlier detection in complex data, such as rule-based knowledge bases. What distinguishes this work from others is, first, the application of clustering algorithms to rules in domain knowledge bases, and secondly, the use of outlier detection algorithms to detect unusual rules in knowledge bases. The aim of the paper is the analysis of using four algorithms for outlier detection in rule-based knowledge bases: Local Outlier Factor (LOF), Connectivity-based Outlier Factor (COF), K-MEANS, and SMALLCLUSTERS. The subject of outlier mining is very important nowadays. Outliers in rules If-Then mean unusual rules, which are rare in comparing to others and should be explored by the domain expert as soon as possible. In the research, the authors use the outlier detection methods to find a given number of outliers in rules (1%, 5%, 10%), while in small groups, the number of outliers covers no more than 5% of the rule cluster. Subsequently, the authors analyze which of seven various quality indices, which they use for all rules and after removing selected outliers, improve the quality of rule clusters. In the experimental stage, the authors use six different knowledge bases. The best results (the most often the clusters quality was improved) are achieved for two outlier detection algorithms LOF and COF.
- Published
- 2020
- Full Text
- View/download PDF
14. An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm
- Author
-
Dan Wang, Xiaolin Du, Ping Yang, Wei Zhuojun, and Tong Li
- Subjects
Traverse ,General Computer Science ,Computer science ,0208 environmental biotechnology ,02 engineering and technology ,outlier detection ,SOFM ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,General Materials Science ,Point (geometry) ,Cluster analysis ,cluster ,LOF ,Local outlier factor ,business.industry ,020208 electrical & electronic engineering ,General Engineering ,Canopy ,Pattern recognition ,020801 environmental engineering ,ComputingMethodologies_PATTERNRECOGNITION ,Feature (computer vision) ,Outlier ,Anomaly detection ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
Local Outlier Factor (LOF) outlier detecting algorithm has good accuracy in detecting global and local outliers. However, the algorithm needs to traverse the entire dataset when calculating the local outlier factor of each data point, which adds extra time overhead and makes the algorithm execution inefficient. In addition, if the K-distance neighborhood of an outlier point P contains some outliers that are incorrectly judged by the algorithm as normal points, then P may be misidentified as normal point. To solve the above problems, this paper proposes a Neighbor Entropy Local Outlier Factor (NELOF) outlier detecting algorithm. Firstly, we improve the Self-Organizing Feature Map (SOFM) algorithm and use the optimized SOFM clustering algorithm to cluster the dataset. Therefore, the calculation of each data point's local outlier factor only needs to be performed inside the small cluster. Secondly, this paper replaces the K-distance neighborhood with relative K-distance neighborhood and utilizes the entropy of relative K neighborhood to redefine the local outlier factor, which improves the accuracy of outlier detection. Experiments results confirm that our optimized SOFM algorithm can avoid the random selection of neurons, and improve clustering effect of traditional SOFM algorithm. In addition, the proposed NELOF algorithm outperforms LOF algorithm in both accuracy and execution time of outlier detection.
- Published
- 2019
15. Anomalidetektering av tidsseriedata med hjälp av oövervakad maskininlärningsmetoder: En klusterbaserad tillvägagångssätt
- Author
-
Hanna, Peter and Swartling, Erik
- Subjects
Sannolikhetsteori och statistik ,Anomaly detection ,high frequency sampled ,time series ,Probability Theory and Statistics ,unsupervised machine learning ,DBSCAN ,LOF ,clustering ,dimensionality reduction - Abstract
For many companies in the manufacturing industry, attempts to find damages in their products is a vital process, especially during the production phase. Since applying different machine learning techniques can further aid the process of damage identification, it becomes a popular choice among companies to make use of these methods to enhance the production process even further. For some industries, damage identification can be heavily linked with anomaly detection of different measurements. In this thesis, the aim is to construct unsupervised machine learning models to identify anomalies on unlabeled measurements of pumps using high frequency sampled current and voltage time series data. The measurement can be split up into five different phases, namely the startup phase, three duty point phases and lastly the shutdown phase. The approach is based on clustering methods, where the main algorithms of use are the density-based algorithms DBSCAN and LOF. Dimensionality reduction techniques, such as feature extraction and feature selection, are applied to the data and after constructing the five models of each phase, it can be seen that the models identifies anomalies in the data set given. För flera företag i tillverkningsindustrin är felsökningar av produkter en fundamental uppgift i produktionsprocessen. Då användningen av olika maskininlärningsmetoder visar sig innehålla användbara tekniker för att hitta fel i produkter är dessa metoder ett populärt val bland företag som ytterligare vill förbättra produktionprocessen. För vissa industrier är feldetektering starkt kopplat till anomalidetektering av olika mätningar. I detta examensarbete är syftet att konstruera oövervakad maskininlärningsmodeller för att identifiera anomalier i tidsseriedata. Mer specifikt består datan av högfrekvent mätdata av pumpar via ström och spänningsmätningar. Mätningarna består av fem olika faser, nämligen uppstartsfasen, tre last-faser och fasen för avstängning. Maskinilärningsmetoderna är baserade på olika klustertekniker, och de metoderna som användes är DBSCAN och LOF algoritmerna. Dessutom tillämpades olika dimensionsreduktionstekniker och efter att ha konstruerat 5 olika modeller, alltså en för varje fas, kan det konstateras att modellerna lyckats identifiera anomalier i det givna datasetet.
- Published
- 2020
16. Outliers in rules - the comparision of LOF, COF and KMEANS algorithms
- Author
-
Czesław Horyń and Agnieszka Nowak Brzezińska
- Subjects
Computer science ,media_common.quotation_subject ,outliers ,k-means clustering ,020206 networking & telecommunications ,02 engineering and technology ,ComputingMethodologies_PATTERNRECOGNITION ,COF ,Outlier ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Anomaly detection ,Quality (business) ,quality indices ,Algorithm ,LOF ,General Environmental Science ,media_common ,clustering - Abstract
The aim of the article is the analysis of using LOF, COF and Kmeans algorithms for outlier detection in rule based knowledge bases. The subject of outlier mining is very important nowadays. Outliers in rules mean unusual rules which are rare in comparison to others and should be explored further by the domain expert. In the research the authors use the outlier detection methods to find a given (1%, 5%, 10%) number of outliers in rules. Then, they analyze which of seven various quality indices, that they used for all rules and after removing selected outliers, improve the quality of rule clusters. In the experimental stage the authors used six different knowledge bases. The results show that the optimal results were achieved for COF outlier detection algorithm as the one for which, among all analyzed quality indices, the cluster quality improved most frequently.
- Published
- 2020
17. OUTLIER DETECTION METHOD USE FOR THE NETWORK FLOW ANOMALY DETECTION / IŠSKIRČIŲ RADIMO METODŲ TAIKYMAS ANOMALIJOMS KOMPIUTERIŲ TINKLO PAKETŲ SRAUTUOSE APTIKTI
- Author
-
Rimas Ciplinskas and Nerijus Paulauskas
- Subjects
anomaly detection methods ,Technology ,network flow ,Anomaly-based intrusion detection system ,Computer science ,Science ,anomaly ,Energy Engineering and Power Technology ,02 engineering and technology ,Management Science and Operations Research ,computer.software_genre ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,LOF ,Local outlier factor ,Mechanical Engineering ,Anomaly (natural sciences) ,Flow network ,network attack ,Flow detection ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,computer - Abstract
New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are created and attacks are detected by using them. These methods have a drawback – they cannot detect new attacks. As a solution, anomaly detection methods are used. They allow to detect deviations from normal network behaviour that may show a new type of attack. This article introduces a new method that allows to detect network flow anomalies by using local outlier factor algorithm. Accom-plished research allowed to identify groups of features which showed the best results of anomaly flow detection according the highest values of precision, recall and F-measure. Santrauka Kibernetinių atakų gausa ir įvairovė bei siekis nuo jų apsisaugoti verčia nuolat kurti naujus ir tobulinti jau esamus atakų aptikimo metodus. Kaip rodo praktika, dabartiniai atakų atpažinimo metodai iš esmės veikia pagal antivirusinių programų principą, t.y. sudaromi žinomų atakų šablonai, kuriais remiantis yra aptinkamos atakos, tačiau pagrindinis tokių metodų trūkumas – negalėjimas aptikti naujų, dar nežinomų atakų. Šiai problemai spręsti yra pasitelkiami anomalijų aptikimo metodai, kurie leidžia aptikti nukrypimus nuo normalios tinklo būsenos. Straipsnyje yra pateiktas naujas metodas, leidžiantis aptikti kompiuterių tinklo paketų srauto anomalijas taikant lokalių išskirčių faktorių algoritmą. Atliktas tyrimas leido surasti požymių grupes, kurias taikant anomalūs tinklo srautai yra atpažįstami geriausiai, t. y. pasiekiamos didžiausios tikslumo, atkuriamumo ir F-mato reikšmės. Reikšminiai žodžiai:anomalijos, anomalijų aptikimo metodai, LOF, tinklo paketų srautas, atakos.
- Published
- 2016
- Full Text
- View/download PDF
18. Using the Triangle Inequality to Accelerate Density based Outlier Detection Method
- Author
-
Bidyut Kr. Patra
- Subjects
Speedup ,Triangle inequality ,Computation ,Search engine indexing ,computer.software_genre ,Large datasets ,triangle inequality ,Density based ,Outlier ,Outlier detection ,General Earth and Planetary Sciences ,Anomaly detection ,Data mining ,computer ,LOF ,General Environmental Science ,Mathematics - Abstract
Discovering outliers in a collection of patterns is a very well known problem that has been studied in various application domains. Density based technique is a popular one for finding outliers in a dataset. This technique calculates outlierness of each pattern using statistics of neighborhood of the pattern. However, density based approaches do not work well with large datasets as these approaches need to compute a large number of distance computations inorder to find neighborhood statistics. In this paper, we propose to utilize triangle inequality based indexing approach to speed up the classical density based outlier detection method LOF. Proposed approach computes less number of distance computations compared to the LOF method. Experimental results demonstrate that our proposed method reduces a significant number of distance computations compared to the LOF method.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.