Outlier detection for incomplete real-valued data via rough set theory and granular computing

被引:0
|
作者
Zhao, Zhengwei [1 ]
Yang, Genteng [1 ]
Li, Zhaowen [2 ]
Yu, Guangji [3 ]
机构
[1] Guangxi Minzu Univ, Sch Math & Phys, Nanning, Peoples R China
[2] Yulin Normal Univ, Ctr Appl Math Guangxi, Yulin 537000, Guangxi, Peoples R China
[3] Guangxi Univ Finance & Econ, Sch Big Data & Artificial Intelligence, Nanning, Guangxi, Peoples R China
关键词
RST; GrC; IRVIS; outlier detection; outlier factor; CONTAINMENT NEIGHBORHOODS; ALGORITHMS;
D O I
10.3233/JIFS-230737
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Outlier detection is an important topic in data mining. An information system (IS) is a database that shows relationships between objects and attributes. A real-valued information system (RVIS) is an IS whose information values are real numbers. People often encounter missing values during data processing. A RVIS with the miss values is an incomplete real-valued information system (IRVIS). Due to the presence of the missing values, the distance between two information values is difficult to determine, so the existing outlier detection rarely considered an IS with the miss values. This paper investigates outlier detection for an IRVIS via rough set theory and granular computing. Firstly, the distance between two information values on each attribute of an IRVIS is introduced, and the parameter lambda to control the distance is given. Then, the tolerance relation on the object set is defined according to the distance, and the tolerance class is obtained, which is regarded as an information granule. After then, lambda-lower and lambda-upper approximations in an IRVIS are put forward. Next, the outlier factor of every object in an IRVIS is presented. Finally, outlier detection method for IRVIS via rough set theory and granular computing is proposed, and the corresponding algorithms is designed. Through the experiments, the proposed method is compared with other methods. The experimental results show that the designed algorithm is more effective than some existing algorithms in an IRVIS. It is worth mentioning that for comprehensive comparison, ROC curve and AUC value are used to illustrate the advantages of the proposed method.
引用
下载
收藏
页码:6247 / 6271
页数:25
相关论文
共 50 条
  • [1] Outlier detection for set-valued data based on rough set theory and granular computing
    Lin, Hai
    Li, Zhaowen
    INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2023, 52 (04) : 385 - 413
  • [2] Outlier detection based on granular computing and rough set theory
    Jiang, Feng
    Chen, Yu-Ming
    APPLIED INTELLIGENCE, 2015, 42 (02) : 303 - 322
  • [3] Outlier detection based on granular computing and rough set theory
    Feng Jiang
    Yu-Ming Chen
    Applied Intelligence, 2015, 42 : 303 - 322
  • [4] Outlier detection for incomplete real-valued data based on inner boundary
    Zhao, Zhengwei
    Yang, Genteng
    Li, Zhaowen
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (02) : 3023 - 3041
  • [5] Outlier detection in a multiset-valued information system based on rough set theory and granular computing
    Song, Yan
    Lin, Hai
    Li, Zhaowen
    INFORMATION SCIENCES, 2024, 657
  • [6] Outlier detection for incomplete real-valued data via information entropy and class-consistent technology
    Cai, Xiaopeng
    Li, Zhaowen
    APPLIED INTELLIGENCE, 2024, 54 (07) : 5317 - 5335
  • [7] Granular computing and rough set theory
    Zadeh, Lotfi A.
    Rough Sets and Intelligent Systems Paradigms, Proceedings, 2007, 4585 : 1 - 4
  • [8] Outlier detection using rough set theory
    Jiang, F
    Sui, YF
    Cao, CG
    ROUGH SETS, FUZZY SETS, DATA MINING, AND GRANULAR COMPUTING, PT 2, PROCEEDINGS, 2005, 3642 : 79 - 87
  • [9] Outlier detection algorithm for categortical data using a granular computing theory
    Li, Min
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 457 - 459
  • [10] Atypical Information Theory for Real-Valued Data
    Host-Madsen, Anders
    Sabeti, Elyas
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 666 - 670