a research of how to distinguish suspicious data
Authors
Sheng-zhi Guo, Li-sen Pu, Cheng-wei Yang
Corresponding Author
Sheng-zhi Guo
Available Online January 2015.
- DOI
- 10.2991/iccset-14.2015.81How to use a DOI?
- Keywords
- Outlier Judge.
- Abstract
We get a lot of data from Light weapons testing, such as the data of dispersion and intensive inspection. It is necessary to distinguish the suspicious data to ensure the result of the examination. This essay introduces some criterions about how to judge the outlier in small sample from normal populations, and give some examples to illustrate how to distinguish the data, which can be referred when doing data processing.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Sheng-zhi Guo AU - Li-sen Pu AU - Cheng-wei Yang PY - 2015/01 DA - 2015/01 TI - a research of how to distinguish suspicious data BT - Proceedings of the 2014 International Conference on Computer Science and Electronic Technology PB - Atlantis Press SP - 364 EP - 367 SN - 2352-538X UR - https://doi.org/10.2991/iccset-14.2015.81 DO - 10.2991/iccset-14.2015.81 ID - Guo2015/01 ER -