| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Buried in cloud files? We can help with Spring cleaning!

    Whether you use Dropbox, Drive, G-Suite, OneDrive, Gmail, Slack, Notion, or all of the above, Dokkio will organize your files for you. Try Dokkio (from the makers of PBworks) for free today.

  • Dokkio (from the makers of PBworks) was #2 on Product Hunt! Check out what people are saying by clicking here.

View
 

Outliers_Fraud

Page history last edited by mike@mbowles.com 10 years, 6 months ago

We'll go through the slides for chapter 10 from the book:

chap10_anomaly_detection(1).pdf

 

We'll also look at the microsoft research paper introducing one-class svm:

tr-99-87.pdf

 

We'll go through sample code using the r-packages mvoutlier and extremevalue:

for mvoutlier

mvoutlier-r-Documentation.pdf

MVoutliers.pdf

Filzmoser.pdf

 

for extremevalue:

extremevalues.pdf

 

Here's the R-code we ran in class:

extremeValues.R

mvOutlier.R

convexhull.R

EMlite.R

oneClassSVM.R

 

 

 

Comments (0)

You don't have permission to comment on this page.