ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Numerous Data Processing Ways for Outlier Detection

Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.6, No. 3)

Publication Date:

Authors : ; ;

Page : 58-64

Keywords : IJMTST;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data repositories include huge quantity of knowledge being hold on at numerous locations and transferred from one location to different location. Once the information is moving or storing at some location it's exposed to attack. Different strategies or techniques offered to safeguard data from such attacks however still loopholes would possibly exist. Thus so as to safeguard knowledge from numerous attacks and create it less vulnerable numerous data processing techniques were used. Outliers detection uses these data processing strategies to spot the events or observations that raise suspicions of being intruded. Several hybrid approaches provided to spot well known as well as unknown data specifically. A review on numerous data processing approaches is provided during this paper to deal outlier's detection. We have additionally provided numerous outlier detection algorithms

Last modified: 2020-05-03 01:52:52