SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
Class Outlier Mining:
Distance‐Based Approach
By
Nabil M. Hewahi and Motaz K. Saad
Presented by
Motaz K. Saad
msaad@iugaza.edu
Jan. 2008
International Journal of Intelligent Technology, Vol. 2, No. 1, pp 55-68, 2007
Abstract
• In large datasets, identifying exception or rare
cases with respect to a group of similar cases 
is to be considered very significant problem.  
(unusual pattern)
• The traditional problem (Outlier Mining) is to 
find exception or rare cases in a dataset 
irrespective of the class label of these cases, 
they are considered rare event with respect to 
the whole dataset. 
2
Abstract (Cont.)
• Present an overview of Class Outlier.
• Introduce a novel definition of a class outlier 
and propose COF factor.
• Propose a new algorithm for class outlier 
mining.
• Present experimental results.
• Perform a comparison study.
3
Outlier Definition
• An Outlier is a data object that does not 
comply with the general behavior of the 
data (unusual pattern)
• It can be considered as noise or 
exception but is quite useful in fraud 
detection and rare events analysis.
4
Outlier Mining
• It is the problem of detecting rare 
events, deviant objects, and 
exceptions. 
• Is an important data mining issue in 
knowledge discovery; it has attracted 
increasing interests in recent years. 
5
Outliers
Outliers
6
Outlier Mining: Business Applications
• Medical 
• Education  
• Fraud detection  
• Credit approving
• Stock market analysis
• Identifying computer network intrusions
• Data cleaning
• Surveillance and auditing
• Health monitoring systems
• Insurance, banking, money  laundering   
telecommunication ..., etc). 
7
Outlier Detection Methods
• Statistical based (Distribution based)
• Clustering
• Distance‐based
– K Nearest Neighbors (KNN)
– Density‐Based
• Model‐Based (Neural Network): Replicator 
Neural Network RNN
8
Statistical (Distribution) based 
Outlier Detection Method
9
Variation of Distance‐Based Approach 
for detecting Outlier
10
NN Model for Detection Outlier
11
A schematic view of a fully connected Replicator Neural Network.
What is Class Outlier?
• All the previous Definition of Outliers do 
not consider the class labels of the data 
set
• This means all the previous methods of 
Outliers Mining are devoted on the 
overall data set without looking closely 
to each class label separately.
12
Class Outlier vs. Outlier
13
Class Outliers
Outlier
X Class
Class
Class Outlier Example in heart‐
statlog dataset
14
Att.#
Inst# 1 2 3 4 5 6 7 8 9 10 11 12 13 Class
69 47 1 3 108 243 0 0 152 0 0 1 0 3 present
62 44 1 3 120 226 0 0 169 0 0 1 0 3 absent
150 41 1 3 112 250 0 0 179 0 0 1 0 3 absent
179 50 1 3 129 196 0 0 163 0 0 1 0 3 absent
38 42 1 3 130 180 0 0 150 0 0 1 0 3 absent
253 51 1 3 110 175 0 0 123 0 .6 1 0 3 absent
23 47 1 3 112 204 0 0 143 0 .1 1 0 3 absent
Class Outlier Mining take in consideration the class label of the 
dataset
Class Outlier
Class Outlier Example in house‐
vote‐84 dataset
15
Att.#
Inst# 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Class
407 n n n y y y n n n n y y y y n n democrat
306 n n n y y y n n n n n y y y n n republican
83 n n n y y y n n n n n y y y n n republican
87 n n n y y y n n n n n y y y n n republican
303 n n n y y y n n n n n y y y n n republican
119 n n n y y y n n n n n y y y n n republican
339 y n n y y y n n n n y y y y n n republican
Class Outlier Mining take in consideration the class label of the 
dataset
Class Outlier
Party Behavior of house‐vote‐84 
dataset
16
231
29
714
245
8
55
200
12
218
45
4
36
213
18 22
142
4
163
23
157
83
24
133
11
135
2013
0
50
100
150
200
250
300
ynnoVoteynnoVoteynnoVoteynnoVoteynnoVote
Issue 3Issue 4Issue 5Issue 8Issue 12
Issue #
Votes
Democrat Republican
Class Outlier Definitions
• There are three definition that handle the 
problem that is “given a set of observations with 
class labels, find those that arouse suspicions, 
taking into account the class labels”.
– Semantic Outlier [He,  et al. WAIM’02, 2002]
– Cross Outlier [Papadimitriou and Faloutsos, SSTD’03, 2003]
– Generalization of def. 1 & 2 [He,  et al. ESWA'04, 2004]
17
Semantic Outlier
• Semantic Outlier: a data point, which behaves 
differently with other data points in the same 
class, while looks normal with respect to data 
points in another class [He,  et al. 2002]
18
Cross Outlier
• Cross‐outlier: Given two sets (or classes) of 
objects, find those which deviate with respect to 
the other set [Papadimitriou and Faloutsos 2003]
19
Definition (3)
• Generalization of Definition 1 & 2: The 
generalization does not consider only outliers 
that deviate with respect to their own class, 
but also outliers that deviate with respect to 
other classes [He, et al. 2004].
20
The proposed definitions
• Distance (Similarity) Function
• K Nearest Neighbors
• PCL(T, K)
• Deviation
• K‐Distance
• Class Outlier
• Class Outlier Factor (COF)
21
Distance (Similarity) Function
• Given a data set D = {t1, t2, t3, ..., tn} of tuples
where each tuple ti = <ti1, ti2, ti3, ..., tim, Ci>
contains m attributes and the class label Ci, the
similarity function based on the Euclidean
Distance between two data tuples, X = <x1, x2,
x3, ...., xm> and Y = <y1, y2, y3,..., ym>
(excluding the class labels) is
22
( ) ( )∑ −
m
=i
YX=YX,d
1
2
2
K Nearest Neighbours
• For any positive integer
K, the K-Nearest
Neighbours of a tuple ti
are the K closest tuples
in the data set.
23
PCL (T, K)
• The Probability of the
class label of the
instance T with respect
to the class labels of its
K Nearest Neighbours.
• The instance T has the 
class label y, So the PCL
of the instance T is 2/7.
24
Deviation (T)
• Given a subset DCL = {t1, t2, t3, ..., th} of a
data set D = {t1, t2, t3, ..., tn}. Where h is the
number of instances in DCL and n is the
number of instances of D.
• Given the instance T, DCL contains all the
instances that have the similar class label of
that of the instance T.
• The Deviation of T is how much the instance
T deviates from DCL subset.
25
Deviation (T) (Cont.)
• The Deviation is computed by summing the
distance between the instance T and every
instance in DCL.
26
( ) ( ) DCL.tWhere,tT,d=TDeviation i
h
=i
i ∈∑1
Deviation (T) (Cont.)
27
K‐Distance (The Density Factor)
• K Distance between the
instance T and its K
nearest neighbors, i.e.
how much the K nearest
neighbors instances are
close to the instance T.
28
( ) ( )∑
K
=i
itT,d=TKDist
1
Class Outlier: 
The proposed Definition
• Class Outliers are the top N instances 
which satisfies the following:
–The K‐Distance to its K nearest neighbours 
is the least.
–Its Deviation is the greatest.
–Has different class label form that of its K
nearest neighbours.
29
Class Outlier Factor (COF)
• COF: The Class Outlier Factor of the instance T is
the degree of being Class Outlier. The Class Outlier
Factor of the instance T is defined as:
• PCL(T) from [1/K,1] to [1,K] by multiplying it by K.
α and β factors are to control the importance and the
effects of Deviation and K-Distance, where 0 ≤ α ≤ M
and 0 ≤ β ≤ 1. M is a changeable value based on the
application domain and the initial experimental
results. 30
( ) ( )
( )
( )TKDistβ+
TDeviation
α+TPCLK=TCOF ∗∗∗
1
Guidelines for choosing K, α and β
• If the Deviation in hundreds for example, the
best value for α is 100, and if the Deviation in
tens, then the best value for α is 10 and so on.
• The optimal value of K is determined by trial
and error technique.
– There are many factors affecting the optimal value,
for example dataset size and number of classes are
very important factors that affect choosing the
value of K.
31
Optimal value of K
• High value of K might result in wrong
estimation of PCL.
• Low value of K means KNN is not well
utilized.
• Odd values of K would make more sense for
PCL value.
32
CODB Algorithm Basic Steps
33
• Rank each instance in the dataset D. 
– This is done by calling the Rank procedure after 
providing the CODB with all the necessary data such as 
the value of α, β and K. 
– The Rank Procedure finds out the rank of each 
instance using the formula in slide 28 and gives back 
the rank to CODB
• CODB maintains a list of only the instances of the 
top N class outliers. 
– The less is the value of COF of an instance, the higher 
is the priority of the instance to be a class outlier.
CODB features
• Direct method: no need for clustering.
• Handle numeric (continues), nominal and 
mixed dataset.
• Works on datasets with more than two 
classes.
• More specific in data object ranking than 
other related methods.
34
Experimental results
• The CODB algorithm has been applied on five 
different real world datasets. 
• All the datasets are publicly available at the 
UCI machine learning repository . 
• The datasets are chosen from various domains 
that might have single or mixed data types 
and with two or more class labels. This 
variation is being tested on our proposed 
algorithm to show its capabilities.
35
We performed experiments on the 
following datasets:
• Votes dataset: Nominal, 2 class labels.
• Hepatitis dataset: Mixed, 2 class labels.
• Heart‐statlog dataset. Mixed, 2 class labels.
• Credit approval (credit‐a) dataset: good mix of 
attributes: continuous, nominal with small 
numbers of values, and nominal with larger 
numbers of values, 2 class labels
• Vehicle dataset. Continues, 4 class labels 
36
Votes dataset experimental results
• 1984 United States Congressional Voting 
Records Database.
• Includes votes for each of the U.S. House of 
Representatives Congressmen on the 16 key 
votes.
• 16 Boolean attributes + class name = 17
• 435 instances, 2 classes (61.38% Democrats, 
38.62% Republicans).
37
THE TOP 20 CLASS OUTLIERS OF HOUSE‐VOTE‐84 
DATASET
• K = 7
• Top N COF = 20
• Distance type: Euclidean Distance
• α = 100
• β = 0.1
• Remove Instance With Missing Values: false
• Replace Missing Values: false
38
# Inst. # PCL Dev KDist # Inst. # PCL Dev KDist
1 407
1 896.24 6.0
11 176
2 519.94 8.49
COF: 1.71158 COF: 3.04086
2 375
1 881.78 8.07
12 384
2 832.95 9.34
COF: 1.92051 COF: 3.0543
3 388
1 857.35 8.07
13 365
2 836.65 9.44
COF: 1.92375 COF: 3.0634
4 161
1 819.35 8.49
14 6
2 849.33 9.76
COF: 1.97058 COF: 3.0934
5 267
1 523.66 8.49
15 355
2 524.28 9.12
COF: 2.03949 COF: 3.10283
6 71
1 535.52 9.44
16 164
2 845.19 10.07
COF: 2.13061 COF: 3.12576
7 77
1 799.64 10.39
17 402
2 480.79 10.93
COF: 2.16429 COF: 3.30081
8 325
2 846.64 8.49
18 151
2 879.84 12.0
COF: 2.96664 COF: 3.31366
9 160
2 829.17 8.49
19 173
3 839.0 8.07
COF: 2.96913 COF: 3.9263
10 382
2 851.76 9.02
20 75
3 841.28 9.44
COF: 3.01986 COF: 4.06275 39
Comparison Study
• We performed a comparison study with He’s 
method (2002, 2004).
• Semantic Outlier Factor vs. Class Outlier 
Factor (SOF vs. COF).
40
SOF vs. COF
41
THE TOP 20 SEMANTIC OUTLIERS FOR
HOUSE‐VOTE‐84 DATASET
42
# Inst. # SOF # Inst. # SOF
1 176 0.3036 11 375 1.4520
2 71 0.3394 12 151 1.4927
3 355 0.3645 13 372 1.4950
4 267 0.3659 14 388 1.6365
5 183 0.8726 15 2 1.6489
6 97 0.9892 16 382 1.6727
7 88 1.0724 17 215 1.7010
8 402 1.1690 18 164 1.7168
9 407 1.3309 19 6 1.7236
10 248 1.3487 20 325 1.7259
Comparison Study (Cont.)
• Instance # 176 of votes dataset
– Rank 1 (the top) using SOF.
– Rank 11 using COF.
– PCL(176) = 2/7 → there is another instance of the 
same class within the seven nearest neighbours.
43
Comparison Study (Cont.)
• Instance # 407 of votes dataset
– Rank 9 using SOF.
– Rank 1 (the top) using COF.
– PCL(407) = 1/7.
– The Deviation is the greatest which implies sort of 
uniqueness of the instance (object) behaviour.
– The K-Distance of the instance is very small
(high density of other class type)
– SOF(407) = rank 9 → indicates the disability of 
recognizing such important cases.
44
Conclusions
• In this research we proposed and introduced:
– A novel approach for Class Outliers mining based 
on the K nearest neighbours using distance‐based 
similarity function to determine the nearest 
neighbours.
– Motivation about Class Outliers and their 
significance as exceptional cases.
– Ranking score that is Class Outlier Factor (COF) to 
measure the degree of being a Class Outlier for an 
object.
45
Conclusions (Cont.)
– An efficient algorithm for mining and detection Class 
Outliers. 
– An implementation has been developed using Weka 
framework. 
• We presented:
– Experimental results of the algorithm applied on 
various domains dataset (medical, business, and 
other domains), and for different dataset type 
(continues, nominal with small numbers of values, 
nominal with larger numbers of values, and mixed).
46
Conclusions (Cont.)
– A comparison study has been performed  with 
other methods and results show that our 
proposed algorithm gives more plausible and 
reasonable results than others. In addition, it 
considers mixed data types and more than two 
class label.
47
Future work
• Proposing Class Outlier Detection Model.
• Getting advantage of the output of this work 
to find out a scheme to induce Censored 
Productions Rules (CPRs) from large datasets.
• Developing a weighted distance similarity 
function, where feature weight determination 
might be based on the information gain. 
48
Thank You !... Q&A
49

Mais conteúdo relacionado

Destaque

Open Source Business Models
Open Source Business ModelsOpen Source Business Models
Open Source Business Models
Motaz Saad
 
OS Lab: Introduction to Linux
OS Lab: Introduction to LinuxOS Lab: Introduction to Linux
OS Lab: Introduction to Linux
Motaz Saad
 

Destaque (19)

Browsing The Source Code of Linux Packages
Browsing The Source Code of Linux PackagesBrowsing The Source Code of Linux Packages
Browsing The Source Code of Linux Packages
 
Knowledge discovery thru data mining
Knowledge discovery thru data miningKnowledge discovery thru data mining
Knowledge discovery thru data mining
 
Open Source Business Models
Open Source Business ModelsOpen Source Business Models
Open Source Business Models
 
Browsing Linux Kernel Source
Browsing Linux Kernel SourceBrowsing Linux Kernel Source
Browsing Linux Kernel Source
 
The x86 Family
The x86 FamilyThe x86 Family
The x86 Family
 
Intel 64bit Architecture
Intel 64bit ArchitectureIntel 64bit Architecture
Intel 64bit Architecture
 
OS Lab: Introduction to Linux
OS Lab: Introduction to LinuxOS Lab: Introduction to Linux
OS Lab: Introduction to Linux
 
3.7 outlier analysis
3.7 outlier analysis3.7 outlier analysis
3.7 outlier analysis
 
Class Outlier Mining
Class Outlier MiningClass Outlier Mining
Class Outlier Mining
 
Assembly Language Lecture 5
Assembly Language Lecture 5Assembly Language Lecture 5
Assembly Language Lecture 5
 
مقدمة في تكنواوجيا المعلومات
مقدمة في تكنواوجيا المعلوماتمقدمة في تكنواوجيا المعلومات
مقدمة في تكنواوجيا المعلومات
 
Cross Language Concept Mining
Cross Language Concept Mining Cross Language Concept Mining
Cross Language Concept Mining
 
Assembly Language Lecture 3
Assembly Language Lecture 3Assembly Language Lecture 3
Assembly Language Lecture 3
 
Assembly Language Lecture 4
Assembly Language Lecture 4Assembly Language Lecture 4
Assembly Language Lecture 4
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence Tools
 
Data Mining: Outlier analysis
Data Mining: Outlier analysisData Mining: Outlier analysis
Data Mining: Outlier analysis
 
Structured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and DesignStructured Vs, Object Oriented Analysis and Design
Structured Vs, Object Oriented Analysis and Design
 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
 
Introduction to CLIPS Expert System
Introduction to CLIPS Expert SystemIntroduction to CLIPS Expert System
Introduction to CLIPS Expert System
 

Semelhante a Hewahi, saad 2006 - class outliers mining distance-based approach

On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1
VitAnhNguyn94
 
Slide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.pptSlide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.ppt
ImXaib
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means Clustering
Junghoon Kim
 
CSA 3702 machine learning module 3
CSA 3702 machine learning module 3CSA 3702 machine learning module 3
CSA 3702 machine learning module 3
Nandhini S
 

Semelhante a Hewahi, saad 2006 - class outliers mining distance-based approach (20)

MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptx
 
On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1
 
machine learning - Clustering in R
machine learning - Clustering in Rmachine learning - Clustering in R
machine learning - Clustering in R
 
Multi-Armed Bandits:
 Intro, examples and tricks
Multi-Armed Bandits:
 Intro, examples and tricksMulti-Armed Bandits:
 Intro, examples and tricks
Multi-Armed Bandits:
 Intro, examples and tricks
 
K-adaptive partitioning for survival data
K-adaptive partitioning for survival dataK-adaptive partitioning for survival data
K-adaptive partitioning for survival data
 
26-Clustering MTech-2017.ppt
26-Clustering MTech-2017.ppt26-Clustering MTech-2017.ppt
26-Clustering MTech-2017.ppt
 
Introduction to data mining and machine learning
Introduction to data mining and machine learningIntroduction to data mining and machine learning
Introduction to data mining and machine learning
 
Slide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.pptSlide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.ppt
 
Slide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.pptSlide-TIF311-DM-10-11.ppt
Slide-TIF311-DM-10-11.ppt
 
Machine learning and linear regression programming
Machine learning and linear regression programmingMachine learning and linear regression programming
Machine learning and linear regression programming
 
box plot or whisker plot
box plot or whisker plotbox plot or whisker plot
box plot or whisker plot
 
Training machine learning k means 2017
Training machine learning k means 2017Training machine learning k means 2017
Training machine learning k means 2017
 
Feature Engineering
Feature Engineering Feature Engineering
Feature Engineering
 
ictir2016
ictir2016ictir2016
ictir2016
 
Q
QQ
Q
 
Islamic University Pattern Recognition & Neural Network 2019
Islamic University Pattern Recognition & Neural Network 2019 Islamic University Pattern Recognition & Neural Network 2019
Islamic University Pattern Recognition & Neural Network 2019
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means Clustering
 
Expert estimation from Multimodal Features
Expert estimation from Multimodal FeaturesExpert estimation from Multimodal Features
Expert estimation from Multimodal Features
 
Data mining technique (decision tree)
Data mining technique (decision tree)Data mining technique (decision tree)
Data mining technique (decision tree)
 
CSA 3702 machine learning module 3
CSA 3702 machine learning module 3CSA 3702 machine learning module 3
CSA 3702 machine learning module 3
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Hewahi, saad 2006 - class outliers mining distance-based approach