An improved outlier detection algorithm K-LOF based on density
DOI: 10.23977/cpcs.2017.21001 | Downloads: 166 | Views: 7815
Author(s)
Wang Baoyi 1, Luo Xiangyu 1, Zhang Shaomin 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China
Corresponding Author
Zhang ShaominABSTRACT
The local outlier factor (LOF) algorithm is one of the representative algorithms based on the density outlier detection algorithm. But the algorithm has the problem of high time complexity, not suitable for large data sets and high dimensional data set. Therefore, this paper proposes a new outlier detection algorithm, clustering the data sets determines the data center of data space through the K-means clustering algorithm, building data set primary model by setting the distance threshold of the data set object to the data center, and optimizing the screening process combined the neighbor distribution of data objects. Although the use of clustering algorithm for abnormal data set screening will increase the computational complexity of the algorithm, but the data center space once identified will no longer need to repeat the calculation, so with the increase of data, the advantages of the algorithm will become more and more obvious. After testing, the algorithm can effectively improve the detection accuracy of anomaly factors, and reduce the computational complexity of the algorithm, and can complete the local outlier detection.
KEYWORDS
Data mining; Clustering algorithm; Outlier detectionCITE THIS PAPER
Shaomin, Z., Xiangyu, L. Baoyi, W. (2017) An improved outlier delection algorithm K-LOF based on density. Computing, Performance and Communication Systems (2017) Vol.2, Num.1: 1-7.
REFERENCES
[1] ZUO Jin, CHEN Zemao. Anomaly Detection Algorithm Based on Improved K-means Clustering[J]. Computer Science, 2016, 43(8):258-261.
[2] CAO Ke-Yan, LUAN Fang-Jun,SUN Huan-Liang,DING Guo-Hui. Density-based Local Outlier Detection on Uncertain Data[J]. Chinese Journal of Computer.2016,(39):1-15.
[3] Fu PG, Hu XH. SLDOF: Anomaly Detection Algorithm Based on the Local Distance of Density-based Sampling Data[J]. Ruan Jian Xue Bao/Journal of Software (in Chinese). 2016 :1-16.
[4] ZHANG Zhong-ping, LIANG Yong-xin. Stream Data Outlier Mining Algorithm Based on Reverse k Nearest Neighbors[J].Computer Engineering. 2009, 35(12):11-13.
[5] GU Ping, LIU Hai-bo,LUO Zhi-heng. Multi-clustering based outlier detect algorithm[J]. Application Research of Computers.2013, 30(3):751-753.
[6] Angiulli F, Fassetti F. DOLPHIN:An efficient algorithm for mining distance-based outliers in very large datasets[J]. Acm Transactions on Knowledge Discovery from Data, 2009, 3(1):1-57.
[7] WANG Qian, LIU Shu-zhi. Improvement of local outliers mining based on density[J].Application Research of Computers. 2014, 31(6):1693-1696.
[8] HU Caiping and QIN Xiaolin.A Density-Based Local Outlier Detecting Algorithm[J].Journal of Computer Research and Development.2010, 47(12):2110-2116.
[9] HU Liang, REN Wei-wu,REN Fei,LIU Xiao-bo,JIN Gang. Anomaly Detection Algorithm Based on Improved Density Clustering[J].Journal of Jilin University(Science Edition).2009, 47(5):954-960.
[10] HU Wei, LI Yong, CAO Yijia, ZHANG Zhipeng, ZHAO Qingzhou, DUAN Yilong.Fault identification based on LOF and SVM for smart distribution network.Electric Power Automation Equipment[J].2016, 36(6):7-12.
[11] Tan P N, Steinbach M, Kumar V. Introduction to data mining[M]. FAN Ming, FAN Hongjian, translated.Beijing,China: The People’s Posts and Telecommunications Press[J]. 2010: 328-330.
[12] YAN Yingjie,SHENG Gehao,LIU Yadong,DU Xiuming,WANG Hui,JIANG Xiuchen. Anomalous State Detection of PowerTransformer Based on Algorithm Sliding Windows and Clustering. High Voltage Engineering.2016, 42(12):4020-4025.
Downloads: | 2655 |
---|---|
Visits: | 129079 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks