Table of Contents Author Guidelines Submit a Manuscript
Complexity
Volume 2018, Article ID 9702304, 12 pages
https://doi.org/10.1155/2018/9702304
Research Article

Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases

School of Business, Central South University of China, Changsha 410083, China

Correspondence should be addressed to Yanju Zhou; moc.anis@8524jyz

Received 8 May 2017; Accepted 7 November 2017; Published 10 January 2018

Academic Editor: Eulalia Martínez

Copyright © 2018 Xin Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Latif, C. Cadena, and J. Neira, “Robust loop closing over time for pose graph SLAM,” International Journal of Robotics Research, vol. 32, no. 14, pp. 1611–1626, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Chen, R. H. L. Chiang, and V. C. Storey, “Business intelligence and analytics: from big data to big impact,” MIS Quarterly: Management Information Systems, vol. 36, no. 4, pp. 1165–1188, 2012. View at Google Scholar · View at Scopus
  3. X. Wu, X. Zhu, G. Q. Wu, and W. Ding, “Data mining with big data,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 97–107, 2014. View at Google Scholar
  4. H. Zheng, Y. Wang, Z. Xiong, L. I. Kunming, Z. Chong, and F. Yin, “Parallel mining on label-constraint proximity pattern,” Computer Engineering Applications, vol. 51, no. 9, pp. 135–141, 2015. View at Google Scholar
  5. Y.-Z. Zhang, J. Xiao, X.-C. Yun, and F.-Y. Wang, “DDoS attacks detection and control mechanisms,” Journal of Software, vol. 23, no. 8, pp. 2058–2072, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. W. U. Chun-Qiong, “Network intrusion detection model based on feature selection,” Computer Simulation, vol. 29, no. 6, pp. 234–237, 2012 (Chinese). View at Google Scholar
  7. O. N. Almasi and M. Rouhani, “Fast and de-noise support vector machine training method based on fuzzy clustering method for large real world datasets,” Turkish Journal of Electrical Engineering & Computer Sciences, vol. 24, no. 1, pp. 219–233, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zeng, Z. Zhang, and A. Kusiak, “Predictive modeling and optimization of a multi-zone HVAC system with data mining and firefly algorithms,” Energy, vol. 86, pp. 393–402, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Zhang, J. Liu, and Y. Xu, “Rapid computation of structural static extreme response based on reduced basis method,” Chinese Journal of Computational Mechanics, vol. 32, no. 1, pp. 94–98, 2015. View at Google Scholar
  10. A. Purarjomandlangrudi, A. H. Ghapanchi, and M. Esmalifalak, “A data mining approach for fault diagnosis: an application of anomaly detection algorithm,” Measurement, vol. 55, no. 3, pp. 343–352, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Kim, S. Lee, and S. Kim, “A novel hybrid intrusion detection method integrating anomaly detection with misuse detection,” Expert Systems with Applications, vol. 41, no. 4, pp. 1690–1700, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. M. A. A. Mamun, M. A. Hannan, A. Hussain, and H. Basri, “Theoretical model and implementation of a real time intelligent bin status monitoring system using rule based decision algorithms,” Expert Systems with Applications, vol. 48, pp. 76–88, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. A. J.-P. Tixier, M. R. Hallowell, B. Rajagopalan, and D. Bowman, “Construction safety clash detection: identifying safety incompatibilities among fundamental attributes using data mining,” Automation in Construction, vol. 74, no. 7, pp. 39–54, 2017. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Tran, L. Fan, and C. Shahabi, “Distance-based outlier detection in data streams,” Proceedings of the VLDB Endowment, vol. 9, no. 12, pp. 1089–1100, 2016. View at Google Scholar
  15. B. S. M. Hosseini, B. Amiri, M. Mirzabagheri, and Y. Shi, “A new intrusion detection approach using pso based multiple criteria linear programming,” Procedia Computer Science, vol. 55, no. 4, pp. 231–237, 2015. View at Google Scholar
  16. J. Liu and H. F. Deng, “Outlier detection on uncertain data based on local information,” Knowledge-Based Systems, vol. 51, no. 1, pp. 60–71, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. N. N. R. Ranga Suri, M. Narasimha Murty, and G. Athithan, “Detecting outliers in categorical data through rough clustering,” Natural Computing, vol. 15, no. 3, pp. 385–394, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier detection for temporal data: a survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2250–2267, 2014. View at Publisher · View at Google Scholar
  19. R. B. Torbert, C. T. Russell, W. Magnes et al., The FIELDS instrument suite on MMS: Scientific objectives, measurements, and data products, vol. 199, Space Science Reviews, 2016.
  20. E. M. Schwartz, E. T. Bradlow, and P. S. Fader, “Model selection using database characteristics: Developing a classification tree for longitudinal incidence data,” Marketing Science, vol. 33, no. 2, pp. 188–205, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. N. A. Khan and B. Boashash, “Multi-component instantaneous frequency estimation using locally adaptive directional time frequency distributions,” International Journal of Adaptive Control and Signal Processing, vol. 30, no. 3, pp. 429–442, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. N. Ali Khan, S. Ali, and M. Jansson, “Direction of arrival estimation using adaptive directional time-frequency distributions,” Multidimensional Systems and Signal Processing, vol. 45, no. 6, pp. 1–19, 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. M. A. B. Othman, J. Belz, and B. Farhang-Boroujeny, “Performance analysis of matched filter bank for detection of linear frequency modulated chirp signals,” IEEE Transactions on Aerospace and Electronic Systems, vol. 53, no. 1, pp. 41–54, 2017. View at Google Scholar
  24. W. Dai and W. Ji, “A mapreduce implementation of C4. 5 decision tree algorithm,” International Journal of Database Theory and Application, vol. 7, no. 1, pp. 49–60, 2014. View at Google Scholar
  25. S. Stimpson, B. Collins, and B. Kochunas, “Improvement of transport-corrected scattering stability and performance using a Jacobi inscatter algorithm for 2D-MOC,” Annals of Nuclear Energy, vol. 105, no. 6, pp. 1–10, 2017. View at Publisher · View at Google Scholar · View at Scopus
  26. Z. Zhang, H. Fang, and H. Wang, “A new mi-based visualization aided validation index for mining big longitudinal web trial data,” IEEE Access, vol. 4, no. 5, pp. 2272–2280, 2016. View at Publisher · View at Google Scholar · View at Scopus
  27. K. Zhou and S. Yang, “Exploring the uniform effect of fcm clustering: a data distribution perspective,” Knowledge-Based Systems, vol. 96, no. 3, pp. 76–83, 2016. View at Google Scholar
  28. M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. M. A. Ambusaidi, X. He, and P. Nanda, “Building an intrusion detection system using a filter-based feature selection algorithm,” IEEE Transactions on Computers, vol. 65, no. 10, pp. 2986–2998, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  30. R. Latif, H. Abbas, S. Latif, and A. Masood, “EVFDT: an enhanced very fast decision tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network,” Mobile Information Systems, vol. 2015, Article ID 260594, 13 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Patidar, R. B. Pachori, and N. Garg, “Automatic diagnosis of septal defects based on tunable-Q wavelet transform of cardiac sound signals,” Expert Systems with Applications, vol. 42, no. 7, pp. 3315–3326, 2015. View at Publisher · View at Google Scholar · View at Scopus
  32. J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta, “In-network outlier detection in wireless sensor networks,” Knowledge and Information Systems, vol. 34, no. 1, pp. 23–54, 2013. View at Publisher · View at Google Scholar · View at Scopus
  33. R. Laxhammar and G. Falkman, “Inductive conformal anomaly detection for sequential detection of anomalous sub-trajectories,” Annals of Mathematics and Artificial Intelligence, vol. 74, no. 1-2, pp. 67–94, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. H.-X. Ni, “Based sliding window cloud computing platform of network intrusion detection algorithm,” in Proceedings of the 14th IEEE International Conference on Computer and Information Technology, CIT 2014, pp. 927–930, China, September 2014. View at Publisher · View at Google Scholar · View at Scopus