Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Anomaly Detection: Techniques and Applications, PDF eBook

Anomaly Detection: Techniques and Applications PDF

Edited by Saira Banu

Part of the Computer Science, Technology and Applications series

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

When information in the data warehouse is processed, it follows a definite pattern.

An unexpected deviation in the data pattern from the usual behavior is called an anomaly.

The anomaly in the data is also referred to as noise, outlier, spammer, deviations, novelties and exceptions.

Identification of the rare items, events, observations, patterns which raise suspension by differing significantly from the majority of data is called anomaly detection.

With progress in the technologies and the widespread use of data for the purpose for business the increase in the spams faced by the individuals and the companies are increasing day by day.

This noisy data has boomed as a major problem in various areas such as Internet of Things, web service, Machine Learning, Artificial Intelligence, Deep learning, Image Processing, Cloud Computing, Audio processing, Video Processing, VoIP, Data Science, Wireless Sensor etc.

Identifying the anomaly data and filtering them before processing is a major challenge for the data analyst.

This anomaly is unavoidable in all areas of research.

This book covers the techniques and algorithms for detecting the deviated data.

This book will mainly target researchers and higher graduate learners in computer science and data science.

Information

Information