Results 31 to 40 of about 23,619,888 (317)

SCOUT: Single-cell outlier analysis in cancer

open access: yesbioRxiv, 2020
Outliers are often ignored or even removed from data analysis. In cancer, however, single outlier cells can be of major importance, since they have uncommon characteristics that may confer capacity to invade, metastasize, or resist to therapy.
G. Onzi   +5 more
semanticscholar   +1 more source

Modal Parameter Identification Of Cable Stayed Bridge Based On Exploratory Data Analysis

open access: yesArchives of Civil Engineering, 2015
In order to identify the modal parameters of civil structures it is vital to distinguish the defective data from that of appropriate and accurate data. The defects in data may be due to various reasons like defects in the data collection, malfunctioning ...
Khan I., Shan D., Li Q.
doaj   +1 more source

Hybrid Detection of Anomalies in Financial Transactions: A Rule-Based and Machine Learning Approach [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
This paper presents a hybrid methodology for detecting anomalies in financial transactions including card-initiated transactions and payments by combining rule-based logic with unsupervised machine learning techniques.
Alexandra Stavrositu (Caratas)   +4 more
doaj   +1 more source

Outlier Detection Credit Card Transactions Using Local Outlier Factor Algorithm (LOF)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Threats or fraud for credit card owners and banks as service providers have been harmed by the actions of perpetrators of credit card thieves. All transaction data are stored in the bank's database, but are limited in information and cannot be used as a ...
Silvano Sugidamayatno, Danang Lelono
doaj   +1 more source

Outlier Identification in Model-Based Cluster Analysis [PDF]

open access: yesJournal of Classification, 2015
In model-based clustering based on normal-mixture models, a few outlying observations can influence the cluster structure and number. This paper develops a method to identify these, however it does not attempt to identify clusters amidst a large field of noisy observations. We identify outliers as those observations in a cluster with minimal membership
Evans, Katie   +2 more
openaire   +3 more sources

Hot Spot Analysis versus Cluster and Outlier Analysis: An Enquiry into the Grouping of Rural Accommodation in Extremadura (Spain)

open access: yesISPRS Int. J. Geo Inf., 2019
The importance of the distribution of accommodation businesses over a certain area has grown remarkably, especially if such distribution is mapped using tools and techniques that utilize the territory as a variable in the analysis.
J. Sánchez-Martín   +2 more
semanticscholar   +1 more source

Behavior-Based Outlier Detection for Network Access Control Systems [PDF]

open access: yes, 2019
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices
Dhillon Gurjeet Singh   +3 more
core   +1 more source

Predicting software project effort: A grey relational analysis based method [PDF]

open access: yes, 2011
This is the post-print version of the final paper published in Expert Systems with Applications. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural ...
Albrecht   +45 more
core   +1 more source

On the maximum drawdown during speculative bubbles [PDF]

open access: yes, 2006
A taxonomy of large financial crashes proposed in the literature locates the burst of speculative bubbles due to endogenous causes in the framework of extreme stock market crashes, defined as falls of market prices that are outlier with respect to the ...
Ausloos   +10 more
core   +2 more sources

Differentially Private Analysis of Outliers [PDF]

open access: yes, 2015
This paper presents an investigation of differentially private analysis of distance-based outliers. Outlier detection aims to identify instances that are apparently distant from other instances. Meanwhile, the objective of differential privacy is to conceal the presence or absence of any particular instance. Outlier detection and privacy protection are
Rina Okada, Kazuto Fukuchi, Jun Sakuma
openaire   +3 more sources

Home - About - Disclaimer - Privacy