Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (2): 68-80.doi: 10.23940/ijpe.24.02.p2.6880
Previous Articles Next Articles
Aparna Shrivastava* and P Raghu Vamsi
Submitted on
;
Revised on
;
Accepted on
Contact:
* E-mail address: Aparna Shrivastava and P Raghu Vamsi. Improving Anomaly Classification using Combined Data Transformation and Machine Learning Methods [J]. Int J Performability Eng, 2024, 20(2): 68-80.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Maharana K., Mondal S., andNemade B.A Review: Data Pre-Processing and Data Augmentation Techniques. [2] Gallego G., Cuevas C., Mohedano R., andGarcia, N. on the Mahalanobis Distance Classification Criterion for Multidimensional Normal Distributions. [3] Osborne J.Improving Your Data Transformations: Applying the Box-Cox Transformation. [4] Urolagin S., Sharma N., andDatta T.K.A Combined Architecture of Multivariate LSTM with Mahalanobis and Z-Score Transformations for Oil Price Forecasting. [5] Sun Y., Xu A., Wang K., Jia S., Guo H., andHan X.Anomaly Detection of Marine Diesel Engine Valve System Based on Mahalanobis Distance. In [6] Cudney E.A., Paryani K., andRagsdell K.M.Applying the Mahalanobis-Taguchi System to Vehicle Handling. [7] Garcıa Y.G., Shadaydeh M., Mahecha M., andDenzler J. Attribution of Multivariate Extreme Events, 2019. [8] Suthaharan S., Alzahrani M., Rajasegarar S., Leckie C., andPalaniswami M.Labelled Data Collection for Anomaly Detection in Wireless Sensor Networks. In [9] Occupancy Detection, http://archive.ics.uci.edu/ml/datasets/Occupancy+Detection, accessed on January 1, 2024. [10] Anomaly Detection in Multivariate Time Series, https://www.kaggle.com/code/drscarlat/anomaly-detection-in-multivariate-time-series, accessed on January 1, 2024. [11] AnoML-IoT, https://www.kaggle.com/code/hkayan/anoml-iot, accessed on January 1, 2024. [12] Pan P., Li R., andZhang Y.Predicting Punching Shear in RC Interior Flat Slabs with Steel and FRP Reinforcements using Box-Cox and Yeo-Johnson Transformations. [13] Zhang H., Li Q., Yang Y., Jing J., Wang J.T., Wang H., andShang Z.Solar Flare Index Prediction using Sdo/Hmi Vector Magnetic Data Products with Statistical and Machine-Learning Methods. [14] Othman, S.A. and Ali, H.T.M. on the Use of the Power Transformation Models to Improve the Temperature Time Series. [15] Raymaekers, J. and Rousseeuw, P.J.Transforming Variables to Central Normality. [16] Manikandan S.Data Transformation. [17] Villasenor Alva, J.A. and Estrada, E.G. A Generalization of Shapiro-Wilk's Test for Multivariate Normality. [18] Hanusz, Z. and Tarasińska, J.Normalization of the Kolmogorov-Smirnov and Shapiro-Wilk Tests of Normality. [19] González-Estrada, E. and Cosmes, W. Shapiro-Wilk Test for Skew Normal Distributions Based on Data Transformations. [20] Li P.Box-Cox Transformations: An Overview, 2005. [21] Atkinson A.C., Riani M., andCorbellini A.The Box-Cox Transformation: Review and Extensions, 2021. [22] Sakia R.M.The Box-Cox Transformation Technique: A Review. [23] Gnanadesikan R. [24] Weisberg S.Yeo-Johnson Power Transformations. [25] Raju V.G., Lakshmi K.P., Jain V.M., Kalidindi A., andPadma V.Study the Influence of Normalization/Transformation Process on the Accuracy of Supervised Classification. In [26] Patro S.G.O.P.A.L. and Sahu, K.K. Normalization: A Preprocessing Stage.arXiv preprint arXiv:1503.06462, 2015. [27] Al-Faiz, M.Z., Ibrahim, A.A., and Hadi, S.M. The Effect of Z-Score Standardization (Normalization) on Binary Input Due the Speed of Learning in Back-Propagation Neural Network. [28] McLachlan, G.J. and Peel, D. Robust Cluster Analysis via Mixtures of Multivariate T-Distributions. In [29] Moghaddam, R.F. and Cheriet, M.Beyond Pixels and Regions: A Non-Local Patch Means (NLPM) Method for Content-Level Restoration, Enhancement, and Reconstruction of Degraded Document Images. [30] Ekström J.Mahalanobis' Distance Beyond Normal Distributions, 2011. [31] Sánchez, J. MARDIA, KV, JT KENT, JM BIBBY: Multivariate Analysis. Academic Press, London‐New York‐Toronto‐Sydney‐San Francisco, 1982. [32] Priyam A., Abhijeeta G.R., Rathee A., andSrivastava S.Comparative Analysis of Decision Tree Classification Algorithms. [33] Kataria, A. and Singh, M.D.A Review of Data Classification using K-Nearest Neighbour Algorithm. [34] Ali N., Neagu D., andTrundle P.Evaluation of K-Nearest Neighbour Classifier Performance for Heterogeneous Data Sets. [35] Leung K.M.Naive Bayesian Classifier. [36] Breiman L.Random Forests. |
[1] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
[2] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[3] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
[4] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
[5] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
[6] | Kalyani H. Deshmukh, Gajendra R. Bamnote, and Pratik K Agrawal. A Novel Approach for Drought Monitoring and Evaluation using Time Series Analysis and Deep Learning [J]. Int J Performability Eng, 2024, 20(8): 498-509. |
[7] | Saurabh Saxena, and Chetna Gupta. Optimizing Bug Resolution: A Data-Driven Developer Recommendation System [J]. Int J Performability Eng, 2024, 20(8): 510-519. |
[8] | Lakshya Vaswani, Sai Sri Harsha, Subham Jaiswal, and Aju D. Unravelling Complexity: Investigating the Effectiveness of SHAP Algorithm for Improving Explainability in Network Intrusion System Across Machine and Deep Learning Models [J]. Int J Performability Eng, 2024, 20(7): 421-431. |
[9] | Meenakshi Chawla and Meenakshi Pareek. A Hybrid Deep Learning Perspective for Software Effort Estimation [J]. Int J Performability Eng, 2024, 20(7): 442-450. |
[10] | Ajeet Kumar Sharma and Rakesh Kumar. IoT Malware Detection and Dynamic Analysis of MQTT Simulated Network [J]. Int J Performability Eng, 2024, 20(7): 451-459. |
[11] | Abhishek Gupta and Jaspreet Singh. Data-Driven Security Framework for VANET using Firefly and ANN [J]. Int J Performability Eng, 2024, 20(6): 344-354. |
[12] | Poorana Senthilkumar S, Wilfred Blessing N. R., Subramani B, and Rajesh Kanna R. Additively Composite Model Objective Function for Routing Protocol for Low-Power and Lossy Network Protocol [J]. Int J Performability Eng, 2024, 20(5): 300-311. |
[13] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
[14] | Harshita Batra and Leema Nelson. ESD: E-mail Spam Detection using Cybersecurity-Driven Header Analysis and Machine Learning based Content Analysis [J]. Int J Performability Eng, 2024, 20(4): 205-213. |
[15] | Priya Singh and Rajalakshmi Krishnamurthi. AgriGuard: IoT-Powered Real-Time Object Detection and Alert System for Intelligent Surveillance [J]. Int J Performability Eng, 2024, 20(4): 232-241. |
|