Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Granular Box Regression Methods for Outlier Detection

Print
PDF
IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
© 2013 by IJCA Journal
ICIIIOES - Number 8
Year of Publication: 2013
Authors:
K. Kavitha
K. Selvakumar
M. Neelamegan

K Kavitha, K Selvakumar and M Neelamegan. Article: Granular Box Regression Methods for Outlier Detection. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(8):1-4, December 2013. Full text available. BibTeX

@article{key:article,
	author = {K. Kavitha and K. Selvakumar and M. Neelamegan},
	title = {Article: Granular Box Regression Methods for Outlier Detection},
	journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences},
	year = {2013},
	volume = {ICIIIOES},
	number = {8},
	pages = {1-4},
	month = {December},
	note = {Full text available}
}

Abstract

Granular computing (GrC) is an emerging computing paradigm of information processing. It concerns the processing of complex information entities called information granules, which arise in the process of data abstraction and derivation of knowledge from information. Granular computing is more a theoretical perspective, it encourages an approach to data that recognizes and exploits the knowledge present in data at various levels of resolution or scales. Granular computing provides a rich variety of algorithms including methods derived from interval mathematics, fuzzy and rough sets and others. Within this framework granular box regression was proposed recently. The core idea of granular box regression is to determine a fuzzy graph by embedding a given dataset into a predefined number of "boxes". Granular box regression utilizes intervals a challenge is the detection of outliers. In this paper, we propose borderline method and residual method to detect outliers in granular box regression. We also apply these methods to artificial as well as to real data of motor insurance.

References

  • Y. Y. Yao, "Human-inspired granular computing", IGI Global, Hershey, PA, USA, 2010,pp. 1–15.
  • Y. Y. Yao, "Perspectives of granular computing",in: Proceedings 2005 IEEE, International Conference on Granular Computing GrC 2005), vol. 1, pp. 85–90.
  • J. T. Yao, "A ten-year review of granular computing", in: Proceedings 2007 IEEE International Conference on Granular Computing (GrC 2007), pp. 734–739.
  • D. M. Hawkins, "Identification of Outliers", Chapman and Hall, London, New York, 1980.
  • L. A. Zadeh, "Toward human level machine intelligence – is it achievable? The need for a paradigm shift", IEEE Computational Intelligence magazine 3(2008) 11–22.
  • V. J. Hodge, J. Austin, "A survey of outlier detection methodologies", Artificial Intelligence Review 22 (2004) 85–126.
  • J. T. Yao, "Recent developments in granular computing: a bibliometrics study", in: Proceedings IEEE International Conference on Granular Computing, 2008, pp. 74–79.
  • J. Davis, "Aversion to loss and information overload: an experimental investigation", in: Proceedings International Conference on Information Systems (ICIS 2009), Phoenix, AZ, USA, 2009.
  • Yanjuan yang, Michael V. Mannino, "An experimental comparison of real and artificial deception using a deception generation model", Information Sciences 212 (2012) 44–56.
  • G. Peters, "Granular box regression", IEEE Transactions on Fuzzy systems 19 (2011) 1141-1152.
  • Inhokang, MyongK. Jeong, Dongjoon Kong, "A differentiated one-class classification method with application to intrusion
  • detection", Expert Systems with Applications 39 (2012) 3899–3905.
  • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection", in: Proceedings of the Third SIAM International Conference on Data Mining, 2003.
  • E. M. Knorr, R. T. Ng, "Finding intentional knowledge of distance-based outliers", 25th International Conference on Very Large DataBases (VLDB 1999).
  • A. van Eye, C. Schuste, "Regression Analysis for Social Sciences", Academic Press, San Diego, 1998.
  • J. Kaufman, P. J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis, John Wiley, New York, USA, 1990.
  • J. Cohen, P. Cohen, S. West, L. Aiken, "Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences", Lawrence Erlbaum Associates, Mahwah, NJ, 2003.
  • P. J. Rousseeuw, M. Hubert, "Robust statistics for outlier detection", WIREs Data Mining and Knowledge Discovery 1 (2011) 73–79.
  • Fang Yu Ke, Fu Yan, Zhou Jun Lin, "Research of outlier mining based adaptive intrusion detection techniques", third international conference on knowledge discovery and data mining 2010.
  • V. Arunkumar, Dr. A. Saradha, "An efficient data retrieval clustering based anomaly intrusion detection system in mining process with time prediction", International journal of communication and engineering, volume 04- no. 4, Issue: 02 March2012.
  • SherishJohri, "Novel method for intrusion detection using data mining", International journal of advanced research in computer science and software engineering, volume2, issue4, April 2012.