Proceedings of the 2014 International Conference on Computer Science and Electronic Technology

a research of how to distinguish suspicious data

Authors
Sheng-zhi Guo, Li-sen Pu, Cheng-wei Yang
Corresponding Author
Sheng-zhi Guo
Available Online January 2015.
DOI
10.2991/iccset-14.2015.81How to use a DOI?
Keywords
Outlier Judge.
Abstract

We get a lot of data from Light weapons testing, such as the data of dispersion and intensive inspection. It is necessary to distinguish the suspicious data to ensure the result of the examination. This essay introduces some criterions about how to judge the outlier in small sample from normal populations, and give some examples to illustrate how to distinguish the data, which can be referred when doing data processing.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2014 International Conference on Computer Science and Electronic Technology
Series
Advances in Computer Science Research
Publication Date
January 2015
ISBN
10.2991/iccset-14.2015.81
ISSN
2352-538X
DOI
10.2991/iccset-14.2015.81How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Sheng-zhi Guo
AU  - Li-sen Pu
AU  - Cheng-wei Yang
PY  - 2015/01
DA  - 2015/01
TI  - a research of how to distinguish suspicious data
BT  - Proceedings of the 2014 International Conference on Computer Science and Electronic Technology
PB  - Atlantis Press
SP  - 364
EP  - 367
SN  - 2352-538X
UR  - https://doi.org/10.2991/iccset-14.2015.81
DO  - 10.2991/iccset-14.2015.81
ID  - Guo2015/01
ER  -