An Analysis of Outlier Detection Through Clustering Method
An Analysis of Outlier Detection Through Clustering Method
1Assistant Professor, Department of Computer Applications, Jawahar Science College, Neyveli, TamilNadu, India
2Professor, Department of Computer Applications, Dr. M.G.R. Educational & Research Institute, Chennai, TamilNadu, India
Received: 08 Nov 2020; Received in revised form: 03 Dec 2020; Accepted: 12 Dec 2020; Available online: 30 Dec 2020
©2020 The Author(s). Published by Infogain Publication. This is an open access article under the CC BY license
(https://creativecommons.org/licenses/by/4.0/).
Abstract— This research paper deals with an outlier which is known as an unusual behavior of any substance
present in the spot. This is a detection process that can be employed for both anomaly detection and abnormal
observation. This can be obtained through other members who belong to that data set. The deviation present in
the outlier process can be attained by measuring certain terms like range, size, activity, etc. By detecting
outlier one can easily reject the negativity present in the field. For instance, in healthcare, the health condition
of a person can be determined through his latest health report or his regular activity. When found the person
being inactive there may be a chance for that person to be sick. Many approaches have been used in this
research paper for detecting outliers. The approaches used in this research are 1) Centroid based approach
based on K-Means and Hierarchical Clustering algorithm and 2) through Clustering based approach. This
approach may help in detecting outlier by grouping all similar elements in the same group. For grouping, the
elements clustering method paves a way for it. This research paper will be based on the above mentioned 2
approaches.
Keywords— detection of an outlier, data set, clustering approach, abnormality.
Simulation. Social data can be used for News, DigiCam, and Learning Patterns
YouTube. In data mining, how we now had to split the instruction
process into two classes particularly, Supervised
understanding and Unsupervised understanding. Back in
Supervised mastering, it's a kind of procedure by which the
two entered and desired output numbers have been all
provided. Input and output signal numbers are tagged for
classification to supply an understanding foundation for
prospective data processing system systems. The word
tricked learning stems out of the notion an algorithm is
learning more by your training data set, which is looked at
whilst an educator. The calculations include underneath
Supervised finding out are Conclusion bushes, Similarity
finding out, Bayesian logic, Service vector machines (SVM).
Back in Unsupervised mastering, there's not any requirement
• Data: a collection of facts usually obtained as the result to oversee this version. As an alternative, the version is
of experiences, observations, or experiments permitted to get the job done in its to detect advice. It largely
• Data may consist of numbers, words, images, … handles all the unlabelled info. Unsupervised learning
• Data: lowest level of abstraction calculations enable us to do more intricate processing
responsibilities in comparison to learning. Even though,
Data mining Techniques:
experiential learning could be unpredictable compared with
additional all-natural learning procedures. In this paper, we
focus on Hierarchical Clustering and also Kmeans
Clustering(Arthur & Vassilvitskii, 2006).
Clustering:
Having similar faculties clusters objects need to shape, using
the automatic procedure. We utilize clustering, to specify
lessons. Then suitable things have to place in each class.
Cluster calculations could be categorized based on the
cluster models readily offered based on the type of info
people we try to analyze [2]. In machine learning,
perspective clusters correspond to both hidden patterns, the
search for clusters is still unsupervised understanding, and
the resulting system represents an information concept. From
a practical standpoint, clustering Has an extraordinary role in
data mining programs like scientific information exploration,
There are six such data mining techniques namely Decision information retrieval, and text mining, spatial database
Trees, Sequential Pattern s, Clustering, Prediction, applications, Net analysis, CRM, promotion, health
Association, and Classification, out of which we deal with diagnostics, computational biology, and Others(Manning et
Clustering. al., 2008).
Observing the plot above, we can intuitively conclude that: Hierarchical clustering is mostly used when the application
1. The first two points (15 and 20) are close to each other requires a hierarchy, e.g creation of a taxonomy. However,
and should be in the same cluster they are expensive in terms of their computational and
storage requirements.
2. The third point (30) is closer to the first formed
cluster(15, 20). So it is merged with the first cluster Agglomerative Hierarchical Clustering
next. This bottom-up strategy starts by placing each object in
3. Now the newly formed cluster is (15, 20, 30). its own cluster and then merges these atomic clusters into
larger and larger clusters until all of the objects are in a
4. Then, the next closer clusters are 50 and 63. So merge
single cluster or until certain termination conditions are
them in the next step, i.e. (50, 63).
satisfied. Most hierarchical clustering methods belong to this
Merge, in each step, the two clusters, whose two closest category. They differ only in their definition of inter-cluster
members have the smallest distance. similarity.
n. Discovering unexpected entrances in Data [10] Arthur, David, and Sergei Vassilvitskii. k-means++: The
Bases for information Mining to find glitches, advantages of careful seeding. Stanford, 2006.
valid or frauds however abrupt entrances(Xu & [11] Angelin, B., and A. Geetha. "Outlier Detection using
Clustering Techniques–K-means and K-median." 2020 4th
Wunsch, 2008).
International Conference on Intelligent Computing and
Control Systems (ICICCS). IEEE, 2020.
III. CONCLUSION [12] Angelin, B., and D. Devakumari MCA. "Outlier Detection
using Clustering Algorithm A Survey."
This research paper deals with the process of detecting
outlier through the clustering approach. Outlier which is
known as an unusual behavior of any substance present in
the spot. This is a detection process that can be employed for
both anomaly detection and abnormal observation. This can
be obtained through other members who belong to that data
set. The positives and negatives of dealing with K-Means
and Hierarchical Clustering have been discussed. The
algorithm must be modified in order to obtain proper results
for detecting outlier. Further study on this research will
concentrate more on enhancing the algorithm to obtain a
better result.
REFERENCES
[1] Benjelloun, Fatima-Zahra, Ayoub Ait Lahcen, and Samir
Belfkih. "Outlier detection techniques for big data streams:
focus on cybersecurity." International Journal of Internet
Technology and Secured Transactions 9.4 (2019): 446-474.
[2] Sualeh, Muhammad, and Gon-Woo Kim. "Dynamic multi-
lidar based multiple object detection and
tracking." Sensors 19.6 (2019): 1474.
[3] Zhao, Xingwang, et al. "Optimal design of an indoor
environment by the CFD-based adjoint method with area-
constrained topology and cluster analysis." Building and
Environment 138 (2018): 171-180.
[4] Wang, Zhao-Yu, et al. "Weighted z-Distance-Based
Clustering and Its Application to Time-Series Data." Applied
Sciences 9.24 (2019): 5469.
[5] Bezerra, Clauber Gomes, et al. "An evolving approach to
unsupervised and real-time fault detection in industrial
processes." Expert systems with applications 63 (2016): 134-
144.
[6] Bhattacharya, Gautam, Koushik Ghosh, and Ananda S.
Chowdhury. "Outlier detection using neighborhood rank
difference." Pattern Recognition Letters 60 (2015): 24-31.
[7] Pimentel, Marco AF, et al. "A review of novelty
detection." Signal Processing 99 (2014): 215-249.
[8] Manning, Christopher D., Hinrich Schütze, and Prabhakar
Raghavan. Introduction to information retrieval. Cambridge
university press, 2008.
[9] Xu, Rui, and Donald Wunsch. "Survey of clustering
algorithms." IEEE Transactions on neural networks 16.3
(2005): 645-678.