Tagged articles
19 articles
Page 1 of 1
IT Services Circle
IT Services Circle
May 15, 2026 · Artificial Intelligence

Why Your Validation Set Fails: Outliers Are Skewing Your Data

The article explains how outliers can dramatically distort training and validation results in machine learning, outlines practical detection methods such as business rules, Z‑Score, IQR and Isolation Forest, and demonstrates cleaning techniques with a complete house‑price prediction case study in Python.

Isolation ForestPythondata cleaning
0 likes · 19 min read
Why Your Validation Set Fails: Outliers Are Skewing Your Data
Machine Learning Algorithms & Natural Language Processing
Machine Learning Algorithms & Natural Language Processing
Mar 26, 2026 · Artificial Intelligence

UniOD: A Single Model for Zero‑Training Cross‑Domain Anomaly Detection

UniOD introduces a universal outlier detection model that leverages historical labeled datasets to train one deep graph‑neural‑network‑based model, enabling plug‑and‑play anomaly detection on unseen domains without any retraining, and is backed by theoretical guarantees and extensive cross‑domain experiments.

Graph Neural NetworkUniODanomaly detection
0 likes · 10 min read
UniOD: A Single Model for Zero‑Training Cross‑Domain Anomaly Detection
Linux Ops Smart Journey
Linux Ops Smart Journey
Sep 8, 2025 · Cloud Native

How Envoy’s Circuit Breakers and Outlier Detection Stop Service Avalanches

This article explains how Envoy’s circuit‑breaker and outlier‑detection features protect micro‑service architectures from avalanche failures by limiting concurrent connections, ejecting unhealthy instances, and provides configuration examples, testing methods, and best‑practice tips for building resilient cloud‑native systems.

Circuit BreakingCloud NativeEnvoy
0 likes · 11 min read
How Envoy’s Circuit Breakers and Outlier Detection Stop Service Avalanches
Architecture & Thinking
Architecture & Thinking
Jun 18, 2025 · Cloud Native

How Outlier Detection in Service Mesh Boosts Service Reliability

This article explains the concept, implementation principles, configuration details, and common use cases of Outlier Detection in Service Meshes, showing how it isolates faulty instances to improve stability, performance, and automated operations in cloud‑native environments.

Cloud NativeMicroservicesReliability
0 likes · 6 min read
How Outlier Detection in Service Mesh Boosts Service Reliability
JD Tech Talk
JD Tech Talk
Jun 12, 2025 · Product Management

How to Tackle Outliers in Internet A/B Experiments: Methods, Pitfalls, and Practical Tips

This article explores why outliers appear in large‑scale internet A/B tests, explains their impact on experiment precision, compares traditional trim and winsorize techniques, reviews a range of statistical and machine‑learning detection methods, and offers practical recommendations for handling them in product experiments.

A/B testingexperiment designoutlier detection
0 likes · 15 min read
How to Tackle Outliers in Internet A/B Experiments: Methods, Pitfalls, and Practical Tips
JD Cloud Developers
JD Cloud Developers
Jun 12, 2025 · Fundamentals

How to Tackle Outliers in Internet A/B Experiments: Methods & Best Practices

This article explores why outliers destabilize online A/B tests, explains their statistical definitions, compares trimming and winsorizing techniques, reviews classic and machine‑learning detection methods, and offers practical guidance for applying these approaches to improve experiment reliability.

A/B testingexperimental designoutlier detection
0 likes · 14 min read
How to Tackle Outliers in Internet A/B Experiments: Methods & Best Practices
JD Retail Technology
JD Retail Technology
Jan 7, 2025 · Fundamentals

Handling Outliers in Internet A/B Experiments: Concepts, Methods, and Practical Recommendations

The article explains why outliers destabilize internet A/B tests, outlines their causes, compares trimming and winsorizing, presents lightweight detection (e.g., kurtosis) and risk‑control strategies, and offers practical recommendations for bias‑aware removal and variance‑reduction techniques to improve experimental precision.

.trimA/B testingexperiment design
0 likes · 10 min read
Handling Outliers in Internet A/B Experiments: Concepts, Methods, and Practical Recommendations
Python Programming Learning Circle
Python Programming Learning Circle
May 10, 2024 · Artificial Intelligence

Comprehensive Overview of Common Anomaly Detection Methods with Code Examples

This article compiles and explains a variety of common anomaly detection techniques—including distribution‑based, distance‑based, density‑based, clustering, tree‑based, dimensionality‑reduction, classification, and prediction methods—providing algorithm descriptions, workflow steps, advantages, limitations, and ready‑to‑run Python code snippets for each approach.

PythonUnsupervised Learninganomaly detection
0 likes · 23 min read
Comprehensive Overview of Common Anomaly Detection Methods with Code Examples
Model Perspective
Model Perspective
Dec 6, 2022 · Fundamentals

How to Perform a One‑Sample t‑Test in SPSS: Step‑by‑Step Guide

This guide walks through a health‑survey example, showing how to check SPSS assumptions for outliers and normality, perform a one‑sample t‑test on BMI data, interpret the output, and draw a statistically significant conclusion about the sample mean versus the population mean.

BMISPSSnormality test
0 likes · 7 min read
How to Perform a One‑Sample t‑Test in SPSS: Step‑by‑Step Guide
Model Perspective
Model Perspective
Aug 13, 2022 · Artificial Intelligence

Mastering Outlier Detection: Techniques, Algorithms, and PyOD Implementation

Outlier detection identifies data points far from the norm, using methods such as the 3‑sigma rule, boxplots, K‑Nearest Neighbors, and numerous probabilistic and proximity‑based algorithms, with practical PyOD code examples for training, evaluating, and visualizing models across various techniques.

anomaly detectionmachine learningoutlier detection
0 likes · 8 min read
Mastering Outlier Detection: Techniques, Algorithms, and PyOD Implementation
Python Programming Learning Circle
Python Programming Learning Circle
Jul 15, 2022 · Artificial Intelligence

Comprehensive Overview of Common Anomaly Detection Methods with Python Code Examples

This article compiles and explains various common anomaly detection techniques—including distribution‑based, distance‑based, density‑based, clustering, tree‑based, dimensionality‑reduction, classification, and prediction methods—providing theoretical descriptions, algorithmic steps, advantages, limitations, and Python code examples for each approach.

Pythonanomaly detectionoutlier detection
0 likes · 18 min read
Comprehensive Overview of Common Anomaly Detection Methods with Python Code Examples
Python Programming Learning Circle
Python Programming Learning Circle
Feb 28, 2022 · Artificial Intelligence

Time Series Data Preprocessing: Missing Value Imputation, Denoising, and Outlier Detection

This article explains essential time series preprocessing techniques—including data sorting, handling missing values with interpolation methods, applying rolling averages, Fourier transform denoising, and detecting anomalies using rolling statistics, isolation forests, and K‑means clustering—illustrated with Python code on the AirPassengers and Google stock datasets.

DenoisingPythonTime Series
0 likes · 9 min read
Time Series Data Preprocessing: Missing Value Imputation, Denoising, and Outlier Detection
Python Programming Learning Circle
Python Programming Learning Circle
Dec 18, 2020 · Fundamentals

Data Exploration and Cleaning: Core Concepts, Steps, and Example Workflow

This article explains the purpose of data exploration and cleaning, outlines core analysis tasks, details missing‑value and outlier handling techniques—including various imputation methods—and illustrates the complete workflow with example images and a histogram‑based distribution analysis.

data cleaningdata explorationdata preprocessing
0 likes · 3 min read
Data Exploration and Cleaning: Core Concepts, Steps, and Example Workflow
Cloud Native Technology Community
Cloud Native Technology Community
Jul 4, 2019 · Cloud Native

Mastering Istio Circuit Breakers: Hystrix vs Istio, Config & Real‑World Tests

This article explains the concept of circuit breaking and rate limiting in micro‑service architectures, compares Hystrix and Istio implementations, details Istio's ConnectionPool and outlierDetection settings, maps their parameters to Envoy, and provides step‑by‑step command‑line examples that demonstrate how these controls behave in practice.

Cloud NativeIstioMicroservices
0 likes · 23 min read
Mastering Istio Circuit Breakers: Hystrix vs Istio, Config & Real‑World Tests
Alibaba Cloud Developer
Alibaba Cloud Developer
May 22, 2019 · Artificial Intelligence

Mastering Anomaly Detection: From Moving Averages to Isolation Forests

This comprehensive guide explores a wide range of anomaly detection techniques—including time‑series methods, statistical models, distance‑based approaches, tree‑based isolation forests, graph algorithms, behavior‑sequence Markov models, and supervised machine‑learning models—detailing their principles, formulas, and practical scenarios for detecting outliers in advertising, fraud, and system monitoring.

Isolation ForestTime Seriesanomaly detection
0 likes · 19 min read
Mastering Anomaly Detection: From Moving Averages to Isolation Forests
JD Tech
JD Tech
Jan 26, 2018 · Artificial Intelligence

JD Big Data R&D Department Presents Three Accepted Papers at AAAI-2018

The JD Big Data R&D team announced that three of its research papers—covering cross‑domain human parsing, multi‑view outlier detection, and orthogonal weight normalization for deep neural networks—were accepted at the prestigious AAAI‑2018 conference, highlighting the department's contributions to computer vision, data mining, and deep learning.

Computer VisionCross‑domain Adaptationartificial intelligence
0 likes · 8 min read
JD Big Data R&D Department Presents Three Accepted Papers at AAAI-2018
Architects Research Society
Architects Research Society
Jan 11, 2018 · Operations

Envoy Outlier Detection and Ejection Mechanism Overview

The article explains Envoy's outlier detection and ejection process, detailing how unhealthy upstream hosts are identified and temporarily removed based on consecutive 5xx errors, gateway failures, or success‑rate thresholds, and describes the logging format and configuration options for these health‑check mechanisms.

Operationsejectionhealth check
0 likes · 6 min read
Envoy Outlier Detection and Ejection Mechanism Overview