A Review on Numerous Data Processing Ways for Outlier Detection
Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.6, No. 3)Publication Date: 2020-04-30
Authors : Shaik Khasim R Sravani; Md Sirajul Huque;
Page : 58-64
Keywords : IJMTST;
Abstract
Data repositories include huge quantity of knowledge being hold on at numerous locations and transferred from one location to different location. Once the information is moving or storing at some location it's exposed to attack. Different strategies or techniques offered to safeguard data from such attacks however still loopholes would possibly exist. Thus so as to safeguard knowledge from numerous attacks and create it less vulnerable numerous data processing techniques were used. Outliers detection uses these data processing strategies to spot the events or observations that raise suspicions of being intruded. Several hybrid approaches provided to spot well known as well as unknown data specifically. A review on numerous data processing approaches is provided during this paper to deal outlier's detection. We have additionally provided numerous outlier detection algorithms
Other Latest Articles
- An ANN Based SMES Implanted Smart Grid for EV Charging Station
- Reliable Metrics and Deployment Issues of Tactical ad-hoc Networks
- Simulation of Sensorless Speed Control of Induction Motor using Model Reference Adaptive Technique with Fuzzy Inference System
- Design and Implementation of Ripple Carry Adder using Various CMOS Full Adder Circuits in 180nm and 130nm Technology
- Design and Analysis of Hybrid Converter for High Voltage Medical Applications
Last modified: 2020-05-03 01:52:52