Nobody downloaded yet

Anomaly Detection Methodologies - Research Proposal Example

Comments (0) Cite this document
Anomaly Detection Methodologies


Medical records of patients contain thousands or millions of electronic entries that record information on patient’s conditions, diagnosis and treatments. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Anomaly Detection Methodologies
Read TextPreview

Extract of sample
"Anomaly Detection Methodologies"

Download file to see previous pages Besides, current practices and procedures aimed at identifying such patients are slow, expensive and unsuitable for incorporating new analytical mechanisms. Buckeridge (2007) argues that Current algorithms used for achieving this risk stratification are dependent on the labelling of the patient data as positive or negative. This classification implies that determining trends and subsets that are rare in a given population requires an analysis of large data sets and the identification of positive aspects up to a threshold level. This process, as explained above, is not just slow or expensive, but puts additional burden on patients and hospital administrators, thereby affecting the validity and effectiveness of such practices. The proposed study aims to use appropriate anomaly detection methods that are known to be suitable for detecting interesting or unusual patterns in a given data set. Bohmer (2009) says that new frameworks allow anomaly detection to be applied towards determining anomalous patterns in subsets of attributes associated with a data set. In simpler words, anomaly detection methods identify unusual occurrences with the data that appear to deviate from the normal behaviour exhibited by a majority of the data set. Examples of such anomalies include an epidemic outbreak, traffic congestion in a certain section of roads or an attack on a network (Applegate, 2009). The proposed research aims to extend the standard approach to anomaly detection by devising techniques to identify partial patterns that exhibit anomalous behaviour with the remainder of the data set. Such techniques are believed to aid in the detection and assessment of unusual outcomes or decisions related to patient management in healthcare institutions. Anomaly Detection Several studies by researchers like Nurcan (2009) and Anderson (2007) have applied anomaly detection techniques to healthcare. In fact, anomaly detection has proved useful in areas under clinical behaviour and medical technology such as blood samples, vestibular information, mammograms and electroencephalographic signals (Brandt, 2007). However, the same principles have found little application in enhancing the quality of patient care or identifying existing deficiencies in the assistance extended to patients. The proposed study aims to improve and extend anomaly detection techniques to such relatively unexplored domains. While previous studies have relied primarily on detecting existing conditions such as diseases, the proposed research will apply similar methods to ascertain the level of risk that accompanies a potential outcome being analyzed. Thus, the measurement of this risk as a result of uncovering anomalies is likely to help in forecasting the vulnerability of patients to certain diseases or deficiencies. The study proposed to utilize several anomaly detection methods by applying them to existing clinical data on patients. In doing so, the number of outcomes and patients being analyzed will be much larger and wider than those adopted by previous studies. Some of the detection methods that will be included as part of the proposed study are listed below: Nearest Neighbour method As the name suggests, the nearest neighbour method helps detect patients (anomalies) from a given population based on information pertaining to their ‘n’ nearest neighbours. This method is based on the principle of vectors that are used to sum the distances between a point and it ‘n’ closes neighbours. As a result, dense and sparse regions are identified based on the total score which is lesser in the former case ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Anomaly Detection Methodologies Research Proposal”, n.d.)
Retrieved from https://studentshare.org/gender-sexual-studies/1405168-writing-research-proposal-based-on-a-paper
(Anomaly Detection Methodologies Research Proposal)
“Anomaly Detection Methodologies Research Proposal”, n.d. https://studentshare.org/gender-sexual-studies/1405168-writing-research-proposal-based-on-a-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Nurse-to-Patient Ratio
Often, the lack of adequate attention to this matter has resulted in the organizations’ inability to extend proper medical care to the patients. On the other hand, there is a general feeling among nurses that increased levels of patient acuity entails delays in providing medical treatment.
8 Pages(2000 words)Research Proposal
Anomaly Detection Using Probability Distribution Method with Focus on Network Intrusion Detection Systems
When information is changed, the distribution modifies from the typical format to a diverse format, normally differentiated by an error margin. The typical distribution assumption and errors representing other error numerical faults with detection techniques have to be employed to lock a network (Singh and Kaur, 2007, p.
3 Pages(750 words)Research Proposal
Campylobacter. coli
A total of 2.4 million reported illnesses and 150 mortalities are caused by the genus Campylobacter every year in the United States (Mead, et al., 1999). Infections particularly from Campylobacter jejuni and C. coli amounts to 420,000 cases of intestinal disease in England alone every year (Tam et al., 2003), while it ranks second in the leading causes of bacterial food poisoning in the United States (Miller, et al., 2006).
7 Pages(1750 words)Research Proposal
Research Methods
It presents coding methods and editing techniques in a vivid way using a sample of ten in the sample provided. How data is analyzed, and interpreted is also discussed based on the sample provided in the section entitled
2 Pages(500 words)Research Proposal
Investigating Dynamic Malware Analysis tool
However, the current malware detection scanning techniques have serious limitations. An easy obfuscation of a software, which is a common
4 Pages(1000 words)Research Proposal
Use of Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics
h is to conduct a review of the software engineering methodologies and principles, and evaluate the most suitable methodology and principle in digital forensic software development. Digital forensic software development is a delicate software development process that requires an
4 Pages(1000 words)Research Proposal
The role animals play in our lives
ive research done on the companionship of animals to the people and the writers suggest towards the effectiveness and close association of this companionship towards a good life. Animals provide us with food and milk on one hand and connect themselves with us in a friendly
7 Pages(1750 words)Research Proposal
Comparative Study: High prevalence of HIV late diagnosis among African communities aged 30-55 in the United Kingdom and Sub Saharan Africa
This is especially shocking when compared with data from Sub-Saharan Africa which shows a similar level of late detection. Clearly, this is a major public health challenge that authorities must seize on. What accounts for the high
5 Pages(1250 words)Research Proposal
The detection of liver (hepatic carcinoma) image protocol using 64-MDCT. The effect of contrast injection technique, patient size and low dose parameters on the image quality
The relationship between patient dose and image quality is significant in liver detection. The image quality in CT is greater than that needed for diagnostic confidence.
2 Pages(500 words)Research Proposal
Week 5 Project #2
Online attack can cause the system to completely shut down, consequently losing essential information. This loss must be prevented through ensuring sufficient security on the information contained within the system.
5 Pages(1250 words)Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Proposal on topic Anomaly Detection Methodologies for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us