SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 687
A Comparative Study for Anomaly Detection in Data Mining
Fenil Shingala1, Shalin Barot2, Bhavesh Oza3
1,2 Student, LDCE Ahmedabad
3Professor, Dept. of Computer Engineering, LD College of Engineering, Gujarat, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this paper, we will discuss some of the
research we have found till and what we have concluded from
that survey. We try to compare and combine three of the
methods we have explored. We will work on Outlier/Anomaly
Detection. Data mining is the processofextractionofdatathat
would be of any kind and Outlier / Anomaly is detection of
irrelevant data.
Key Words: moving averages, mean absolute deviation,
DBSCAN, regression, anomaly detection, outlier
detection, prediction analysis, data mining
1.INTRODUCTION
Anomaly detection was originally proposed for intrusion
detection systems to prevent cases such as burglary.
Anomaly detection for IDS is normally accomplished with
statistical analysis by defining boundaries, yet ought to
similarly be conceivable with soft computing, and inductive
learning. [1]
Fig -1: Anomaly detection
In data mining, anomaly detection is the identification of
items, events or observations that do not comply with an
expected pattern or other items in a dataset. Normally the
anomalous items will mean some sort of issue, for
example bank extortion, a structural defect, medical
problems or mistakes in content. For example, as figure
shows, in given time series there are some extreme points,
which are largely deviating from other points.
Anomaly detection:
Observing datasets for certain time period and
afterward analyzing patterns to find abnormal behaviors of
upcoming data points detect anomalies. Here we are
comparing few methods to do so. They include basic ideas of
statistical mathematics and clustering techniques.
Moving averages:
In statistics, a moving average is a process of creating a
series of averages of a certain portion of data sets of the
entire data. These averages are called moving mean or
rolling mean. [2]
But how can we do this? The answer is sliding window. First
of all, we will take a series of numbers. Then decide a fixed
subset size that will become a window. Start from initial
index to window size and take an average of numbers. Then
slide a window by removing first number and adding next
number in series after current window size, and take an
average. This will produce a series of averages which is
called moving averages.
It can also be used for anomaly detection. After finding first
moving average we can define threshold limits plus and
minus to current moving average to list out anomalies.
Example:
Let’s consider we are analyzing data taken from a tractor
company. We take sell of each month and plota graph. There
will be three parts to this graph. Middle part; duration is
number of tractors sold were of not too much or too less
proportion. Other two parts will be of too much and too less
sell in which so ever duration.
Let’s say we’re interested in finding periods during which
sell is on peak, so that we can keep more number of tractors
during those duration to save ourselves from shortage.Also,
we need to make sure that we do not order more quantities
than needed when there is less sell. This situation can be
solved by observing history; that is to say look for past sell
records and find out which months are on peak of sell and
which months have comparatively less sell. That is exactly
what moving averages do in terms of time series analysis.
Figure shows a graph for tractor sales and by applying
algorithm we can find out anomalies that are deviating from
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 688
given period average. So whenever graphgoestoextremesit
is considered as anomalous. Here, in graph such extreme
points are depicted in red. It showsupperandlower extreme
values of sales during a particular time, which is exactly
what we seek to find out.
Moving averages can be used for measuring the trend of any
series. This method is applicable to linear as well as non-
linear trends. [3]
On the other hand, the trend obtained bymovingaverages
generally is neither a straight line nor a standard curve. For
this reason the trend cannot be extended for forecasting
future values.
Fig -2: Moving Averages
Mean absolute deviation:
In statistics, the median absolute deviation (MAD) is a
method of findingthevariabilityofasamplethatincludesone
variable quantity. It can also refer to the population
parameter that is estimated by the MAD calculated from a
sample. [4]
For a univariate data set [a1, an] the MAD is characterized as
the median of theabsolutedeviationsfromthedata'smedian:
MAD=median| ai - median |
So in a nutshell, MAD is the median of absolute deviations
from the data's median.
How to find MAD:
1. Find the mean/median of data
2. Find the absolute differences between each data value to
the mean/median
3. Find the mean/median of these differences
Here, note that mean or median both can be used to find
MAD depending on the type of data.
MAD can be used for anomaly detection by defining
thresholds for modulus of division of each point by MAD
(point/MAD). This values after division givesdistribution of
data points with respect to their mean. Then we can easily
define a threshold according to the distribution we get to
extract out outliers.
Data outside the threshold are considered anomalous. It is
more suitable to the types of data whose most of the points
range between particular limits,andanomaliesaredeviating
in such a way that differences from anomalous data to MAD
are larger than most of the points.
Example:
Suppose a company is hosting a cloud service for which they
maintain servers and serves subscribedcustomerswithdata
storage. Let’s say, in a hypothetical situation, company’s all
customer uses most of their cloud storage and also they all
access it at the same time, then in this type of situation there
will be too much burden on CPUs and storage devices. This
type of situations are common in shopping sites mostly,
where for particular given time period there is a lot of
customers make transactions, such as during festivals. So in
this type of situation, whenever critical situation arises, that
is, when load is extreme, they can take precautionary steps
in future to avoid such crises.
While this method shows promisingly advantageous
mathematical side of its implementation, the same side also
is also a cause of its minus point.
Merits:
 Mean deviation is broadly utilized as a part of
different fields, for example, Economics, Business,
Commerce or some other field of such sort.
 When comparison is required this is perhaps the
best measure between at least two arrangements.
 This calculation has its base upon measurement
than an estimate.
 As it is based on the deviations about an average, it
gives us better measure for correlation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 689
Demerits:
 If Range increments on the off chance that the
sample increases, average deviation additionally
increments yet not in a similar proportion.
 For Sociological studies, itis practicallynotused.[5]
DBSCAN:
Density Based Spatial Clustering Algorithm is veryuseful for
finding shapes based on density. Density-Based Spatial
Clustering of Applications with Noise (DBSCAN) is most
widely used density based clustering algorithm. Other such
an algorithm is K-means. These types of algorithms use
measure of reachability and eligibility of forming a cluster.
[6]
Reachability is the condition defined by parameter ε
(epsilon). It stands for the maximum allowed distance
between two points under consideration to be eligible for
being neighbor of each other.
Eligibility to form a cluster is defined by a number. That
number indicates minimum number of points required to
form a cluster. [6]
Epsilon is a parameter to be given manually for maximum
distance to be considered eligible for including data point
into a cluster. [7]
This clustering method creates a sort of chaining by which
two distant points that are at more than ε distance will
eventually be considered as neighbors. Let’sunderstandthis
by an example. Suppose a random point ‘a’ is within ε
distance to another point ‘b’, hence are neighbors.Thispoint
‘b’ in turn is neighbor of point ‘c’. By chaining, point ‘a’and ‘c’
will also be neighbors even if they’re at more than ε distance
apart.
Algorithmic steps for DBSCAN clustering
Let’s understand this by taking sample data pointsofinteger
values. Now, DBSCAN takes two parameters: ε (epsilon) and
The minimum number of points required to form a cluster
(p).
1) Start with a random starting point that has not been
visited.
2) Extract the neighbor of this point usingε(All pointswhich
are within the ε distance are neighbors) by applying
condition difference of each point and point currently in
observation < ε.
3) If there are enough neighbors around this point then
clustering process starts and point is marked as visited else
this point is labeled as noise (But later on this point can
become the part of the cluster).
4) If a point is found to be a part of the cluster then its ε
neighbors are also the part of the cluster and the step 2 is
repeated for all ε neighborhood points. Thisisrepeateduntil
all points in the cluster are determined.
5) After the formation of the cluster,a next randomunvisited
point is taken to repeat the same process of clustering.
6) This process continues until all points are marked as
visited.
Example:
Let’s say, we are developing an algorithm for auto
recognizing lone islands on the map of world or any map
whatsoever. DBSCAN provides perfect solution for this type
of situation. We can decide epsilon by providing minimum
area for a land to fall into a category of “not a lone island”.
We can have these lone islands by looking at resulting
outliers after applying algorithm.
Major features:
Discover clusters of arbitrary shape
Handle noise
One scan
Need density parameters[9]
Comparison:
 Unfortunately, moving averages don't work for all
scenarios, especially for those in very volatile
observations or those that are heavilyinfluencedby
current events. [10]
 While Mean absolute deviationshaslimitationsthat
it is only applicable when there is no measurement
error and when distributions are normal. [11]
 DBSCAN does not work too well when we are
dealing with clusters of varying densities or with
high dimensional data. [7]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 690
Table -1: Comparison of techniques
3. CONCLUSIONS
This brief paper discusses about what Anomalydetectionis,
and comparison of different techniques in data mining.
Moving averages, Mean Absolute Deviation (MAD) and
DBSCAN are most frequently used algorithms in practice.
After comparison it can be said that all three of them have
their own advantages and disadvantages and they can best
be applied in different circumstances.
REFERENCES
[1] Hodge, V. J.; Austin, J. (2004). "A Survey of Outlier
Detection Methodologies".
[2] Statistical Analysis, Ya-lun Chou, Holt International,
1975.
[3] http://www.emathzone.com/tutorials/basic-
statistics/merits-and-demerits-of-moving-average-
method.html
[4] Geary, R. C. (1935). The ratio of the mean deviation to
the standard deviation as a test of normality.
Biometrika, 27(3/4), 310–332.
[5] http://www.publishyourarticles.net/knowledge-
hub/statistics/merits-and-demerits-of-mean-
deviation/1096/
[6] Arlia, Domenica; Coppola, Massimo. "Experiments in
Parallel Clustering with DBSCAN"
[7] http://www.hypertextbookshop.com/dataminingbook/
public_version/contents/chapters/chapter004/section0
04/blue/page003.html
[8] http://www.ques10.com/p/9286/dbscan-clustering-
algorithm-with-an-example/
[9] http://www.investopedia.com/articles/trading/11/pitf
alls-moving-averages.asp
[10] http://www.investopedia.com/articles/trading/11/pitf
alls-moving-averages.asp
[11] http://influentialpoints.com/Training/absolute_deviati
ons.htm
Algorithm Execution
Time
Efficiency Number of
false alerts
Moving
Averages
High High Less
MAD Less Medium More
DBSCAN Medium Medium Average

Contenu connexe

Tendances

Data Preparation with the help of Analytics Methodology
Data Preparation with the help of Analytics MethodologyData Preparation with the help of Analytics Methodology
Data Preparation with the help of Analytics MethodologyRupak Roy
 
IRJET - An Overview of Machine Learning Algorithms for Data Science
IRJET - An Overview of Machine Learning Algorithms for Data ScienceIRJET - An Overview of Machine Learning Algorithms for Data Science
IRJET - An Overview of Machine Learning Algorithms for Data ScienceIRJET Journal
 
Statistics for data scientists
Statistics for  data scientistsStatistics for  data scientists
Statistics for data scientistsAjay Ohri
 
Employees Data Analysis by Applied SPSS
Employees Data Analysis by Applied SPSSEmployees Data Analysis by Applied SPSS
Employees Data Analysis by Applied SPSSijtsrd
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19Qualitative Understanding of Flattening the Curve Term in Context of COVID 19
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19ijtsrd
 
Scatter diagram and control chart
Scatter diagram and control chartScatter diagram and control chart
Scatter diagram and control chartnithyanithi26
 
Real Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningReal Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningIRJET Journal
 
Using microsoft excel for weibull analysis
Using microsoft excel for weibull analysisUsing microsoft excel for weibull analysis
Using microsoft excel for weibull analysisMelvin Carter
 
Exploratory data analysis data visualization
Exploratory data analysis data visualizationExploratory data analysis data visualization
Exploratory data analysis data visualizationDr. Hamdan Al-Sabri
 
Workbook Project
Workbook ProjectWorkbook Project
Workbook ProjectBrian Ryan
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...INFOGAIN PUBLICATION
 
Macromolecules
MacromoleculesMacromolecules
Macromoleculesganctil
 
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignment
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignmentSMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignment
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignmentrahul kumar verma
 

Tendances (20)

Pca analysis
Pca analysisPca analysis
Pca analysis
 
Data Preparation with the help of Analytics Methodology
Data Preparation with the help of Analytics MethodologyData Preparation with the help of Analytics Methodology
Data Preparation with the help of Analytics Methodology
 
IRJET - An Overview of Machine Learning Algorithms for Data Science
IRJET - An Overview of Machine Learning Algorithms for Data ScienceIRJET - An Overview of Machine Learning Algorithms for Data Science
IRJET - An Overview of Machine Learning Algorithms for Data Science
 
Statistics for data scientists
Statistics for  data scientistsStatistics for  data scientists
Statistics for data scientists
 
Employees Data Analysis by Applied SPSS
Employees Data Analysis by Applied SPSSEmployees Data Analysis by Applied SPSS
Employees Data Analysis by Applied SPSS
 
Car insurance - data visualization
Car insurance - data visualizationCar insurance - data visualization
Car insurance - data visualization
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19Qualitative Understanding of Flattening the Curve Term in Context of COVID 19
Qualitative Understanding of Flattening the Curve Term in Context of COVID 19
 
Excel Datamining Addin Advanced
Excel Datamining Addin AdvancedExcel Datamining Addin Advanced
Excel Datamining Addin Advanced
 
Scatter diagram and control chart
Scatter diagram and control chartScatter diagram and control chart
Scatter diagram and control chart
 
Krupa rm
Krupa rmKrupa rm
Krupa rm
 
Real Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningReal Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine Learning
 
Using microsoft excel for weibull analysis
Using microsoft excel for weibull analysisUsing microsoft excel for weibull analysis
Using microsoft excel for weibull analysis
 
Exploratory data analysis data visualization
Exploratory data analysis data visualizationExploratory data analysis data visualization
Exploratory data analysis data visualization
 
Workbook Project
Workbook ProjectWorkbook Project
Workbook Project
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
 
Factors affecting customer satisfaction
Factors affecting customer satisfactionFactors affecting customer satisfaction
Factors affecting customer satisfaction
 
Credit risk - loan default model
Credit risk - loan default modelCredit risk - loan default model
Credit risk - loan default model
 
Macromolecules
MacromoleculesMacromolecules
Macromolecules
 
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignment
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignmentSMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignment
SMU DRIVE SPRING 2017 MBA 103- Statistics for Management solved free assignment
 

Similaire à A Comparative Study for Anomaly Detection in Data Mining

IRJET - Rainfall Forecasting using Weka Data Mining Tool
IRJET - Rainfall Forecasting using Weka Data Mining ToolIRJET - Rainfall Forecasting using Weka Data Mining Tool
IRJET - Rainfall Forecasting using Weka Data Mining ToolIRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 
Survey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesSurvey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesIRJET Journal
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET Journal
 
IRJET- Overview of Forecasting Techniques
IRJET- Overview of Forecasting TechniquesIRJET- Overview of Forecasting Techniques
IRJET- Overview of Forecasting TechniquesIRJET Journal
 
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGES
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGESCASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGES
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGESIRJET Journal
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONIRJET Journal
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET Journal
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET Journal
 
Visualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine LearningVisualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine LearningIRJET Journal
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET Journal
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsIRJET Journal
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTIRJET Journal
 
Descriptive Statistics
Descriptive StatisticsDescriptive Statistics
Descriptive StatisticsCIToolkit
 
IRJET- Financial Analysis using Data Mining
IRJET- Financial Analysis using Data MiningIRJET- Financial Analysis using Data Mining
IRJET- Financial Analysis using Data MiningIRJET Journal
 
Smart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend AnalysisSmart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend AnalysisIRJET Journal
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...IRJET Journal
 
Exploratory Data Analysis - Satyajit.pdf
Exploratory Data Analysis - Satyajit.pdfExploratory Data Analysis - Satyajit.pdf
Exploratory Data Analysis - Satyajit.pdfAmmarAhmedSiddiqui2
 
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...ESEM 2014
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...IJECEIAES
 

Similaire à A Comparative Study for Anomaly Detection in Data Mining (20)

IRJET - Rainfall Forecasting using Weka Data Mining Tool
IRJET - Rainfall Forecasting using Weka Data Mining ToolIRJET - Rainfall Forecasting using Weka Data Mining Tool
IRJET - Rainfall Forecasting using Weka Data Mining Tool
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
Survey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesSurvey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction Techniques
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
IRJET- Overview of Forecasting Techniques
IRJET- Overview of Forecasting TechniquesIRJET- Overview of Forecasting Techniques
IRJET- Overview of Forecasting Techniques
 
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGES
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGESCASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGES
CASE STUDY: ADMISSION PREDICTION IN ENGINEERING AND TECHNOLOGY COLLEGES
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTION
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
Visualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine LearningVisualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine Learning
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLT
 
Descriptive Statistics
Descriptive StatisticsDescriptive Statistics
Descriptive Statistics
 
IRJET- Financial Analysis using Data Mining
IRJET- Financial Analysis using Data MiningIRJET- Financial Analysis using Data Mining
IRJET- Financial Analysis using Data Mining
 
Smart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend AnalysisSmart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend Analysis
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
 
Exploratory Data Analysis - Satyajit.pdf
Exploratory Data Analysis - Satyajit.pdfExploratory Data Analysis - Satyajit.pdf
Exploratory Data Analysis - Satyajit.pdf
 
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
Effect of Temporal Collaboration Network, Maintenance Activity, and Experienc...
 
4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...4Data Mining Approach of Accident Occurrences Identification with Effective M...
4Data Mining Approach of Accident Occurrences Identification with Effective M...
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Dernier (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

A Comparative Study for Anomaly Detection in Data Mining

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 687 A Comparative Study for Anomaly Detection in Data Mining Fenil Shingala1, Shalin Barot2, Bhavesh Oza3 1,2 Student, LDCE Ahmedabad 3Professor, Dept. of Computer Engineering, LD College of Engineering, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this paper, we will discuss some of the research we have found till and what we have concluded from that survey. We try to compare and combine three of the methods we have explored. We will work on Outlier/Anomaly Detection. Data mining is the processofextractionofdatathat would be of any kind and Outlier / Anomaly is detection of irrelevant data. Key Words: moving averages, mean absolute deviation, DBSCAN, regression, anomaly detection, outlier detection, prediction analysis, data mining 1.INTRODUCTION Anomaly detection was originally proposed for intrusion detection systems to prevent cases such as burglary. Anomaly detection for IDS is normally accomplished with statistical analysis by defining boundaries, yet ought to similarly be conceivable with soft computing, and inductive learning. [1] Fig -1: Anomaly detection In data mining, anomaly detection is the identification of items, events or observations that do not comply with an expected pattern or other items in a dataset. Normally the anomalous items will mean some sort of issue, for example bank extortion, a structural defect, medical problems or mistakes in content. For example, as figure shows, in given time series there are some extreme points, which are largely deviating from other points. Anomaly detection: Observing datasets for certain time period and afterward analyzing patterns to find abnormal behaviors of upcoming data points detect anomalies. Here we are comparing few methods to do so. They include basic ideas of statistical mathematics and clustering techniques. Moving averages: In statistics, a moving average is a process of creating a series of averages of a certain portion of data sets of the entire data. These averages are called moving mean or rolling mean. [2] But how can we do this? The answer is sliding window. First of all, we will take a series of numbers. Then decide a fixed subset size that will become a window. Start from initial index to window size and take an average of numbers. Then slide a window by removing first number and adding next number in series after current window size, and take an average. This will produce a series of averages which is called moving averages. It can also be used for anomaly detection. After finding first moving average we can define threshold limits plus and minus to current moving average to list out anomalies. Example: Let’s consider we are analyzing data taken from a tractor company. We take sell of each month and plota graph. There will be three parts to this graph. Middle part; duration is number of tractors sold were of not too much or too less proportion. Other two parts will be of too much and too less sell in which so ever duration. Let’s say we’re interested in finding periods during which sell is on peak, so that we can keep more number of tractors during those duration to save ourselves from shortage.Also, we need to make sure that we do not order more quantities than needed when there is less sell. This situation can be solved by observing history; that is to say look for past sell records and find out which months are on peak of sell and which months have comparatively less sell. That is exactly what moving averages do in terms of time series analysis. Figure shows a graph for tractor sales and by applying algorithm we can find out anomalies that are deviating from
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 688 given period average. So whenever graphgoestoextremesit is considered as anomalous. Here, in graph such extreme points are depicted in red. It showsupperandlower extreme values of sales during a particular time, which is exactly what we seek to find out. Moving averages can be used for measuring the trend of any series. This method is applicable to linear as well as non- linear trends. [3] On the other hand, the trend obtained bymovingaverages generally is neither a straight line nor a standard curve. For this reason the trend cannot be extended for forecasting future values. Fig -2: Moving Averages Mean absolute deviation: In statistics, the median absolute deviation (MAD) is a method of findingthevariabilityofasamplethatincludesone variable quantity. It can also refer to the population parameter that is estimated by the MAD calculated from a sample. [4] For a univariate data set [a1, an] the MAD is characterized as the median of theabsolutedeviationsfromthedata'smedian: MAD=median| ai - median | So in a nutshell, MAD is the median of absolute deviations from the data's median. How to find MAD: 1. Find the mean/median of data 2. Find the absolute differences between each data value to the mean/median 3. Find the mean/median of these differences Here, note that mean or median both can be used to find MAD depending on the type of data. MAD can be used for anomaly detection by defining thresholds for modulus of division of each point by MAD (point/MAD). This values after division givesdistribution of data points with respect to their mean. Then we can easily define a threshold according to the distribution we get to extract out outliers. Data outside the threshold are considered anomalous. It is more suitable to the types of data whose most of the points range between particular limits,andanomaliesaredeviating in such a way that differences from anomalous data to MAD are larger than most of the points. Example: Suppose a company is hosting a cloud service for which they maintain servers and serves subscribedcustomerswithdata storage. Let’s say, in a hypothetical situation, company’s all customer uses most of their cloud storage and also they all access it at the same time, then in this type of situation there will be too much burden on CPUs and storage devices. This type of situations are common in shopping sites mostly, where for particular given time period there is a lot of customers make transactions, such as during festivals. So in this type of situation, whenever critical situation arises, that is, when load is extreme, they can take precautionary steps in future to avoid such crises. While this method shows promisingly advantageous mathematical side of its implementation, the same side also is also a cause of its minus point. Merits:  Mean deviation is broadly utilized as a part of different fields, for example, Economics, Business, Commerce or some other field of such sort.  When comparison is required this is perhaps the best measure between at least two arrangements.  This calculation has its base upon measurement than an estimate.  As it is based on the deviations about an average, it gives us better measure for correlation.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 689 Demerits:  If Range increments on the off chance that the sample increases, average deviation additionally increments yet not in a similar proportion.  For Sociological studies, itis practicallynotused.[5] DBSCAN: Density Based Spatial Clustering Algorithm is veryuseful for finding shapes based on density. Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is most widely used density based clustering algorithm. Other such an algorithm is K-means. These types of algorithms use measure of reachability and eligibility of forming a cluster. [6] Reachability is the condition defined by parameter ε (epsilon). It stands for the maximum allowed distance between two points under consideration to be eligible for being neighbor of each other. Eligibility to form a cluster is defined by a number. That number indicates minimum number of points required to form a cluster. [6] Epsilon is a parameter to be given manually for maximum distance to be considered eligible for including data point into a cluster. [7] This clustering method creates a sort of chaining by which two distant points that are at more than ε distance will eventually be considered as neighbors. Let’sunderstandthis by an example. Suppose a random point ‘a’ is within ε distance to another point ‘b’, hence are neighbors.Thispoint ‘b’ in turn is neighbor of point ‘c’. By chaining, point ‘a’and ‘c’ will also be neighbors even if they’re at more than ε distance apart. Algorithmic steps for DBSCAN clustering Let’s understand this by taking sample data pointsofinteger values. Now, DBSCAN takes two parameters: ε (epsilon) and The minimum number of points required to form a cluster (p). 1) Start with a random starting point that has not been visited. 2) Extract the neighbor of this point usingε(All pointswhich are within the ε distance are neighbors) by applying condition difference of each point and point currently in observation < ε. 3) If there are enough neighbors around this point then clustering process starts and point is marked as visited else this point is labeled as noise (But later on this point can become the part of the cluster). 4) If a point is found to be a part of the cluster then its ε neighbors are also the part of the cluster and the step 2 is repeated for all ε neighborhood points. Thisisrepeateduntil all points in the cluster are determined. 5) After the formation of the cluster,a next randomunvisited point is taken to repeat the same process of clustering. 6) This process continues until all points are marked as visited. Example: Let’s say, we are developing an algorithm for auto recognizing lone islands on the map of world or any map whatsoever. DBSCAN provides perfect solution for this type of situation. We can decide epsilon by providing minimum area for a land to fall into a category of “not a lone island”. We can have these lone islands by looking at resulting outliers after applying algorithm. Major features: Discover clusters of arbitrary shape Handle noise One scan Need density parameters[9] Comparison:  Unfortunately, moving averages don't work for all scenarios, especially for those in very volatile observations or those that are heavilyinfluencedby current events. [10]  While Mean absolute deviationshaslimitationsthat it is only applicable when there is no measurement error and when distributions are normal. [11]  DBSCAN does not work too well when we are dealing with clusters of varying densities or with high dimensional data. [7]
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 690 Table -1: Comparison of techniques 3. CONCLUSIONS This brief paper discusses about what Anomalydetectionis, and comparison of different techniques in data mining. Moving averages, Mean Absolute Deviation (MAD) and DBSCAN are most frequently used algorithms in practice. After comparison it can be said that all three of them have their own advantages and disadvantages and they can best be applied in different circumstances. REFERENCES [1] Hodge, V. J.; Austin, J. (2004). "A Survey of Outlier Detection Methodologies". [2] Statistical Analysis, Ya-lun Chou, Holt International, 1975. [3] http://www.emathzone.com/tutorials/basic- statistics/merits-and-demerits-of-moving-average- method.html [4] Geary, R. C. (1935). The ratio of the mean deviation to the standard deviation as a test of normality. Biometrika, 27(3/4), 310–332. [5] http://www.publishyourarticles.net/knowledge- hub/statistics/merits-and-demerits-of-mean- deviation/1096/ [6] Arlia, Domenica; Coppola, Massimo. "Experiments in Parallel Clustering with DBSCAN" [7] http://www.hypertextbookshop.com/dataminingbook/ public_version/contents/chapters/chapter004/section0 04/blue/page003.html [8] http://www.ques10.com/p/9286/dbscan-clustering- algorithm-with-an-example/ [9] http://www.investopedia.com/articles/trading/11/pitf alls-moving-averages.asp [10] http://www.investopedia.com/articles/trading/11/pitf alls-moving-averages.asp [11] http://influentialpoints.com/Training/absolute_deviati ons.htm Algorithm Execution Time Efficiency Number of false alerts Moving Averages High High Less MAD Less Medium More DBSCAN Medium Medium Average