Empirical Approach to Machine Learning by Plamen P. Angelov & Xiaowei Gu
Author:Plamen P. Angelov & Xiaowei Gu
Language: eng
Format: epub
ISBN: 9783030023843
Publisher: Springer International Publishing
6.3.2 Identifying Potential Anomalies
In the first stage of the AAD algorithm, the discrete multimodal typicality at is obtained using Eq. (4.40). By extending to , one can obtain the multimodal typicality at each data sample (), denoted by .
The Chebyshev inequality [21] (see Eq. 4.27) describes the probability of a particular data sample () to be standard deviations, away from the global mean . For the particular and most popular case of , the probability of to be more than away from is less than . In other words, on average, up to one out of nine data samples may be anomalous. Therefore, the AAD approach assumes that of the data samples within are potentially abnormal (the worst case). Nonetheless, it does not mean that they are actual anomalies.
The AAD approach, firstly, identifies the candidates for global anomalies as of the data samples within , which has the smallest , denoted by . Here, is a small integer corresponding to the in the “ sigma” rule based on the Chebyshev inequality. In this book, we use since the “3σ ” rule is one of the most popular approaches for identifying global anomalies in various applications [10, 36, 37]. However, in traditional approaches, n = 3 does directly influence detecting each anomaly. In contrast, in the AAD approach, this is simply the first stage of sub-selection of potential global anomalies. We also do not assume Gaussian/normal distribution, but consider it to be arbitrary.
Then, the AAD approach identifies the potential local anomalies, denoted by . As the next step, the AAD approach identifies the neighboring unique data samples around each unique data sample located in the hypersphere with as the center and as the radius by Condition 6.2:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25287)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23432)
Kotlin in Action by Dmitry Jemerov(22511)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21975)
Dependency Injection in .NET by Mark Seemann(21845)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20711)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17033)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9199)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)