Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases

Mining outlier data guarantees access security and data scheduling of parallel databases andmaintains high-performance operation of real-time databases. Traditional mining methods generate abundant interference data with reduced accuracy, efficiency, and stability, causing severe deficiencies. This paper proposes a new mining outlier data method, which is used to analyze real-time data features, obtain magnitude spectra models of outlier data, establish a decisional-tree information chain transmission model for outlier data in mobile Internet, obtain the information flow of internal outlier data in the information chain of a large real-time database, and cluster data. Upon local characteristic time scale parameters of information flow, the phase position features of the outlier data before filtering are obtained; the decision-tree outlier-classification feature-filtering algorithm is adopted to acquire signals for analysis and instant amplitude and to achieve the phase-frequency characteristics of outlier data. Wavelet transform threshold denoising is combined with signal denoising to analyze data offset, to correct formed detection filter model, and to realize outlier data mining. The simulation suggests that the method detects the characteristic outlier data feature response distribution, reduces response time, iteration frequency, and mining error rate, improves mining adaptation and coverage, and shows good mining outcomes.


Introduction
With the rapid development of broadband wireless access (BWA) technologies and mobile terminals, the currently emerging mobile Internet integrates both mobile communication and Internet access.The term "mobile Internet" is a generic term that refers to implementations of activities that combine Internet technologies, platforms, commercial patterns, and applications with mobile communication technologies.As the mobile Internet has developed, applying mobile technology to a large real-time database can significantly improve the database's operational efficiency.However, many potential safety hazards can occur during operation of large real-time databases under mobile Internet conditions.Therefore, to avoid security vulnerabilities, investigating how to effectively monitor and mine outlier data in mobile Internet-based large real-time databases has become hot research topics [1][2][3].
Traditionally, mining methods that integrate clustering of mapping perturbation searches and the fuzzy C mean value have been adopted for outlier data mining in large mobile Internet-based real-time databases.However, these methods neglect the complexities of large real-time databases in mobile Internet conditions and limit the efficiency with which outlier data can be detected in such databases [4].A cosine function-based improved logistic model was presented in literature [5] that analyzed chaotic time series using nonlinear time series analysis, constructed an online method called fuzzy least square support vector machine (FLS-SVM), and realized outlier data mining in a mobile Internet-based large real-time database.However, time scale impacts must be further considered for this method, and its confidence probability needs to be improved to increase the accuracy of data mining.Moreover, the required computation process is too complex to be adopted in practice [5].A decision-tree outlier-feature classification-based method for mining outlier data in a mobile Internet-based large realtime database was presented in literature [6]; however, this method tends to be affected by substantial amounts of interference data, which compromises the confidence coefficient

Constructing an Information Transmission
Model for a Decision-Tree Information Chain with Outlier Data and Acquiring Information Flows

Constructing an Information Transmission Model for a Decision-Tree Information Chain with Outlier Data under
Mobile Internet Conditions.Assume that () represents the information amplitude of the outlier data and that  0 refers to the initial data frequency under mobile Internet conditions.
Then, the model of the outlier data amplitude spectrum under mobile Internet conditions is shown below: where rect(/) represents the average time for detection of outlier data under mobile Internet conditions,  is a constant, and  = / refers to the frequency modulation slope of the outlier data information under mobile Internet conditions.
Here,  refers to the distribution bandwidth of the outlier data under mobile Internet conditions, and  refers to the refresh cycle of data under mobile Internet conditions.The decision-tree cross-term information chain is adopted for data under the mobile Internet using the following expression: In the above formula,  represents global frequency of the information and shows a linear relationship with the slope of information frequency modulation in the scope of time.
Formulas ( 1) and ( 2) are used to screen outlier datacarrying information chains under the mobile Internet, remove interference information chains, conduct dynamic analyses, and process the outlier data-carried information chains [16][17][18].
Under mobile Internet conditions, assume that () and () represent the bandwidth and time duration of outlier data, respectively, () represents the band internal frequency spectrum of outlier data [19], and () represents the intrinsic mode function of outlier data under mobile Internet.Then, formula (3) is used to establish a transmission model for the outlier data-carried decision-tree information chains [20].
In the preceding formula,  represents a constant.During mobile Internet operations, the instantaneous frequency of outlier data shows a linear correlation with time within the same pulse width [21,22].The magnitude spectra of the outlier data described with the model of formula (1) are reflected in the information chain table required for the topological structure of formula (2), and information chains with outlier data are transmitted via formula (3).The transmission model for decision-tree information chains with outlier data under mobile Internet is shown in Figure 1.

Acquiring Outlier-Data-Carrying Information Flows in a
Large Real-Time Database.In Section 2.1, based on acquiring and transmitting the outlier data-containing information flows under mobile Internet, the outlier data-containing information flows are acquired for the information chains transmitted to a large real-time database.The specific steps are as follows.
First, a time domain and spatial domain analysis are conducted for the information chains transmitted to the large real-time database.Formula ( 4) is used to obtain chirpsignal amplitude-frequency [23] features of the outlier datacontaining information flows in the information chains: where (V 1 ) + (V 2 ) and (V 1 ) + (V 2 ) represent the attribute value range and integrity of outlier data-contained information flows in the information chains, respectively, while  and , respectively, represent the number of elements and the element weights of outlier data in the information flows.Assume that  represents the global frequency of the outlier data-contained information flows of the information chains in the large real-time database.Then, the global frequency feature can be expressed as follows: Second, based on acquiring the global frequency feature of the information flows, the C4.5 decision-tree model [24] is introduced for information flow abnormal classification feature modeling.In addition, the chirp-signal amplitudefrequency features presented in formula (4) are used for the signal analytical model for information flows.Then, formula (6) is utilized to obtain the enveloping feature of outlier datacontained information flows in the information chains of the large real-time database: In the above formula, () represents the high-frequency component of the decision tree and () and () are the interference feature amplitude and phrase information of the large real-time database, respectively.Formula (7) is then used to obtain the interfering frequency feature formed by outlier data-containing information flows in the information chains: The preceding formula describes the check-bit generated by outlier data-containing information flows in the information chains in the large real-time database that represent the data interference frequency.On this basis, formula ( 8) is used to calculate the weight probability of outlier data-containing information flows in the information chains: Third, after preliminary data screening, dynamic mining is conducted for outlier data-carried information flows.The interference ratio is calculated for every decision-making root node SIR, and the information content of the time domain waveform for a fixed frequency band is obtained as follows: Finally, based on the processing steps above, the outlier data-containing information flows in the information chains of the large real-time database are obtained, forming a basis for the design of a decision-tree outlier-feature-classification algorithm-based outlier data mining method.

Clustering Outlier Data-Containing Information Flows in a Large
Real-Time Database.After acquiring the outlier datacontaining information flows as presented in the preceding sections, the information flows are clustered, and the MOC algorithm [25] optimizes the evaluation criteria for the two clusters using the Xie-Beni (XB) [26] index and the FCM objective function [27]  FCM , respectively, and effectively processes noise contained in the information flow set as well overlapping information flow aggregates.Therefore, the MOC algorithm is adopted to cluster the outlier datacontaining information flows.
The (XB) index measures in-class compactness and interclass separation after the division of the outlier datacontaining information flow clusters and is defined as the ratio of the internal compactness of the outlier data-containing information flow aggregate   COMP to the minimal distance among information flow aggregates   SEP [28]: Then, the optimized FCM objective function  FCM is expressed as follows: During the iterative process of the MOC algorithm, outlier data-containing information flows are set first, before setting the weighting coefficient of every outlier data aggregate, , and the cluster center, .Then, the fuzzy membership (  ) of the sample to every cluster center is calculated according to the following formula: −1/ ,  = 1, . . ., ,  = 1, . . ., .
In formula (12),  denotes the fuzzy clustering index, and  refers to the weighted index.The cluster center V  of MOC algorithm is calculated as follows: Note that the preceding formula is used to calculate the cluster center of every outlier information flow aggregate during the clustering process.When the variance of the cluster center is below 10 −3 , all cluster centers are reinitialized to obtain new result of MOC algorithm cluster center   , as shown in the following formula: In conclusion, the MOC algorithm is used to cluster outlier data-containing information flows in a large realtime database.the clustered information requires further data mining.

Improvement of Outlier Data Mining in a Mobile Internet-Based Large Real-Time Database
The procedures discussed in the previous section improve the method for outlier data mining in a mobile Internetbased large real-time database.The decision-tree outlierclassification feature-based filter algorithm is adopted in this paper.Essentially, decision-tree outlier-classification feature-filtering is a continuous process that moves from high-frequency filtering to low-frequency filtering [28][29][30].
According to the outlier data-containing information flows in the large real-time database, the outlier data phase features before filtering at the local feature time scale parameter are obtained as follows: In the above formula, any outlier data signal () in the system can be expressed as For decision-tree classification feature-filtering, the above formula is adopted as a real signal orthogonal term.The corresponding analytic signal and instantaneous amplitude are obtained as follows: In the above formulas, (V 1 ) and (V 1 ) are orthogonal integrals, while (V 2 ) and (V 2 ) represent Fresnel integrals of the outlier data signals in the information flows of the large real-time database.Decision-tree filtering is used to remove several high-frequency components before the outlier data and several low-frequency fixed characteristic components after the outlier data.The phrase-frequency feature is obtained as follows: The introduced decision-tree outlier-classification feature-filtering algorithm is adopted in this study combined with the threshold noise reduction method for wavelet transforms to reduce signal noise.The offset degree is analyzed.First, the feature state response distribution of outlier data contained by the information flows of the large real-time database is analyzed [31,32].Then, a threshold is set.A wavelet coefficient larger than the threshold is assumed to be generated by an outlier data signal.Finally, formula ( 19) is utilized to obtain the detection filtering model for the outlier data: In addition, formula ( 20) is used to modify the detection filtering model for the outlier data, which finally achieves outlier data mining in the information flows of a mobile Internet-based large real-time database: In the preceding formula,  represents an accommodation coefficient,  is the wavelet decomposition detail coefficient of the natural vibration mode feature of the outlier data in the information flows of the large real-time database, and its value range is 0 ≤  ≤ 1.To improve the confidence coefficient and accuracy of the monitoring model, reduce the false alarm probability, and prevent missed reports, the design requires optimization to improve the probability confidence range of the outlier data mining.Because outlier data in the information flows of the large real-time database show a certain abruptness, their offset degree and average are calculated, the decision-tree classification feature-filtering  and 6.79 dB, respectively.The proposed improved method was adopted for data mining.For the constructed decisiontree outlier-classification feature model, the parameter settings for the modeling process and the simulation experiment are shown in Tables 1 and 2, respectively.According to the parameters in Tables 1 and 2, the mining model for outlier data in a mobile Internet-based large realtime database was constructed as the basis for the data mining experiment.
In the experiment based on the unimproved method, according to the offset degree analysis of the model for outlier data in a mobile Internet-based database, a decisiontree outlier-feature classification method was adopted for outlier data mining.The steps of the traditional method are as follows.First, a decision-tree-based information chain transmission model for outlier data in a mobile Internetbased large real-time database is constructed.Then, the decision-tree classification feature algorithm is used to mine the outlier data.Finally, the model for outlier data signals in the large real-time database is shown in Figure 2.
Interference term datasets were shown when mining outlier data, and there was substantial interference noise in the wide-ranging subspaces of the outlier data series, resulting in a low confidence coefficient of the mining algorithm.It was difficult to construct a model for outlier data mining in a mobile Internet-based large real-time database; consequently, the conditions shown in Figure 2 appeared because the outlier data is submerged in the normal data and can barely be mined.
Therefore, after obtaining the transmission model for the outlier data-containing information chains, denoising and dynamic mining of outlier data-contained information flows and clustering of information flow are required for information chains transmitted into the large real-time database.Only after the denoising and dynamic mining processes are complete, can effective and precise outlier data mining be realized.
Using the proposed method, outlier data-containing information flows in information chains of a large realtime database are obtained first.Then, the chirp-signal amplitude-frequency features are utilized to obtain the global frequency features and to model the data outlier-classification features and analyze its signals.On this basis, the enveloping features formed by outlier data-containing information flows are obtained from the information chains of the large real-time database, and their interference frequencies are acquired.Next, the probability weights are calculated, and after preliminary big-data screening, dynamic mining for the outlier data-containing information flows in the information chains obtains the information content of the time domain waveform for certain frequency bands.
The transmission process of outlier data-contained information flows in information chains in a large real-time database was sampled; and the input and output were set as Data In or Data Out.The sampling frequency for the global outlier data-contained information flows was 12.58 Hz, the sampling interval was 32.4 s, and a total of 1,024 sampling points were output stably [33].The time domain sequence formed by the outlier data information flows was tested first.The time domain sequence waveform of the original outlier data information flows is shown in Figure 3.
To test the effects of the improved method, the CCP-SWNIDA method (Message request is in proportion to message response.With the function of monitoring abnormal conditions, once the percentage of outlier variation is found to be beyond a normal range, the outlier will be alarmed so as to realize the purpose of invasion detection.)(Ni, 2014) [34] was adopted for comparison.The time domain sequence waveform of the outlier data-containing information flows obtained from our method and the CCPSWNIDA method are shown in Figures 4 and 5, respectively.
As shown in Figures 4 and 5, compared with the time domain sequence waveform of the original outlier data information flows, the time domain sequence waveform of the outlier data-containing information flows obtained by the CCPSWNIDA method exhibits high errors and a relatively disordered waveform, while the time domain sequence waveform of outlier data-containing information flows obtained by the method presented in this paper is identical to the time domain sequence waveform of the original outlier data information flows, and it presents a relatively clear waveform.This result indicates that the improved method for acquiring outlier data-containing information flows in the information chains of a mobile Internet-based large real-time database shows certain superiority.
Later, the MOC algorithm was adopted to cluster the outlier data-containing information flows obtained from the presented method, and the clustering extraction result is shown in Figure 6.As Figure 6 shows, the MOC algorithm adaptation effectively reflects the condition features presented by the outlier data-containing information flows, which improves the performance of subsequent outlier data mining.
18:00 06:00 00:00 12:00 Time (h) 5.56 Finally, outlier data mining was conducted for the outlier data-containing information flows using a top-down pattern.Further experiments were conducted using the method presented in this paper, which was obtained according to the model for outlier data-containing information chain transmission under mobile Internet and the model for acquiring outlier data-containing information flows in the information chains of a large real-time database.

Level (m)
First, the phase position features of the prefiltered outlier data were obtained.Then, corresponding analytical signals and instant amplitude values were obtained according to the decision-tree outlier-classification feature-filtering, and the decision-tree filtering method was adopted to remove several high-frequency components before the outlier data and several low-frequency components after the outlier data.The phase-frequency features were then obtained.On this basis, the decision-tree outlier-classification feature-filtering algorithm was introduced and combined with the WT threshold denoising method to obtain the final model for outlier data detection and filtering.This process confirmed the generation of outlier data signals and obtained the feature state response distribution of the outlier data, as shown in Figure 7.A traditional multithreading dynamic data scheduling method was adopted as a comparison method.The feature state response distribution of outlier data based on the traditional method is shown in Figure 8.
In Figure 8, representing the outlier data state response detected by the traditional method-based multithreading dynamic scheduling information flows, the corresponding features are unclear; the method's performance is relatively poor, and substantial interference that compromises the accuracy of detected outlier data exists.In contrast, the improved method presented in this paper presents good outlier data state response features, good response performance, and less spatial interference, resulting in improved outlier data detection accuracy.
For the outlier data feature states, the times and errors of multithreading dynamic scheduling of information flows were compared between the traditional method and the proposed method.The maximum number of detected samples was set to 500, and the time and errors of outlier data feature state responses were compared between the two methods under different sample amounts.The experimental results are shown in Tables 3 and 4.
Tables 2 and 3 indicate that the average time required by the proposed method to detect outlier data state responses from dynamic scheduled information flows is 2.83 s, shorter than the traditional method, which required 7.86 s.The difference amounts to a reduction of 63.99% compared to the traditional method, suggesting that the proposed method has higher response efficiency.The average error rates of the proposed method and the traditional method are 0.0025 and 0.066, respectively; the improved method reduces the average error rate by 96.2% compared to the traditional method.This result suggests that the proposed method guarantees detection efficiency and reduces detection error of the system, showing the absolute superiority of its detection effect.
Later, the number of iterations and the fitness of the outlier data state response detected by dynamic scheduling information flows were compared between the traditional and the proposed methods.for this comparison, there were 10 trials, and the number of iterations and the fitness were compared between the two methods under different sample amounts.The results are shown in Tables 5 and 6.
An analysis of Tables 5 and 6 reveals that the numbers of iterations of the outlier data feature state responses required by different methods are different.The number of iterations represents the performance of each method to acquire an optimal solution.The average number of iterations required by the traditional method is 81.1, while the average number of iterations required by the proposed method is 19.4,merely 23.9% of the traditional method.This result indicates that the proposed method detects outlier data rapidly and obtains an optimal solution quickly, showing certain superiority; it also explains why the time required for outlier data dynamic scheduling is shorter with the proposed method than with the traditional multithreading feature-information extractionbased method.With respect to fitness value, the traditional method fitness values range from 58 to 159 (with an average of 95.9), while the proposed method's fitness values range from 62 to 69 (with an average of 65.1),only 67.8% of the traditional method.This result indicates that, viewed from the average perspective, the scheduling sequence fitness of the proposed method is smaller and requires less total time for task execution.
According to the significant features of outlier data feature response detected by the improved method-based dynamic scheduling information flows, an outlier data detection filtering model was obtained for subsequent experiments.
By further correcting the model of outlier data detection filtering, the probability confidence coefficient range was improved for outlier data mining, the offset degree and average of outlier data in an information flow were calculated, and the inverse wavelet transform was utilized to remove noise interference to finally realize outlier data mining in the information flow.To compare outcomes, the outlier data confidence coefficient and offset degree were adopted as the measurement indexes.The simulation result of the outlier data cloud picture was obtained, as shown in Figure 9.As the figure shows, the proposed method effectively improves the precise coverage and probability of outlier data mining and shows promise for applications.
The improved method presented in the paper was extended to achieve precise mining of outlier data under one-time transmission in outlier data-contained information flows in information chains of a mobile Internet-based large real-time database.
The results of the outlier data mining are shown in Figure 10.
The waveform in Figure 10 shows that the outlier data mining based on the improved method removes interdata noise and shows relatively high impact response features, full information content, and superior performances, indicating  that the method performed well when applied to outlier data mining in a mobile Internet-based large real-time database.

Performance Test.
To verify the effectiveness of the outlier data mining method presented in this paper, compactness and clustering results of outlier data mining were adopted as the basic performance evaluation indexes of outlier data mining, and the improved method was compared with the traditional knowledge granularity method and support vector machine (SVM) method.Figure 11 shows the compactness analysis results.Then, the outlier data mining results were compared among the different methods.Figure 12 shows the clustering analysis results.
Figure 11 shows that under the same outlier data transmission volume, outlier data mining in a mobile Internetbased large real-time database using the proposed method shows mining compactness far higher than the compactness achieved by the traditional knowledge granularity and support vector machine methods.As the outlier data transmission volume increases, the mining compactness of the Proposed method Knowledge granularity method Support vector machine method 0 0.5  proposed method remains higher than that of the traditional methods, suggesting that the proposed method has a substantial advantage.In Figure 11, the average compactness of the proposed method is approximately 3.155 dB, while the average compactness values of the traditional knowledge granularity and support vector machine methods are 1.26 dB and

Complexity
Proposed method Knowledge granularity method Support vector machine method 0.698 dB, respectively.The proposed method shows increases of 150% and 352% over the two traditional methods.
In Figure 12, according to different measurement scales of data, the pink, the red, and the blue represent different outlier data of different classifications, orders, and values.When using the proposed method for mining of outlier data in a mobile Internet-based large real-time database, the three data types are well-differentiated and clustered.Although some pink outlier data is mixed in with the red outlier data, the amount is low and acceptable.Therefore, the above results indicate that mining of outlier data in a mobile Internet-based large real-time database with the proposed method achieves good outlier data clustering outcomes.
To further verify the high efficiency of the proposed outlier data mining method, outlier data mining accuracy, mining efficiency, mining result stability, and required mining time were adopted as indexes to evaluate the global performances of outlier data mining methods.The traditional knowledge granularity and support vector machine methods were adopted for comparisons.The results are shown in Figures 13-16.
Proposed method Knowledge granularity method Support vector machine method As shown in Figure 13, under the same number of trials and with uncertain data volumes, the outlier data mining in a mobile Internet-based large real-time database using the proposed method achieves a higher mining accuracy than do the traditional knowledge granularity and support vector machine methods.As the number of trials increases, the advantage of the proposed method becomes more obvious.Viewed from a global level, when using the proposed method for outlier data mining, the average mining accuracy is approximately 97.74%, while the average mining accuracies of the traditional knowledge granularity and support vector machine methods are approximately 78.8% and 69.7%, respectively.The proposed method achieved accuracy improvements of 24.03% and 40.22% over the compared methods, respectively.This result demonstrates that the proposed method presented in the paper is absolutely dominant in outlier data mining accuracy.
It can be viewed by analyzing Figure 14 that, under the condition of the same experiment amount and uncertain data amount, the outliner data mining in a mobile Internetbased large real-time database with the method presented in the paper shows higher mining efficiency than the traditional knowledge granularity method and the support vector machine method.With the increase of experiment amount, the advantage of method presented in the paper is more obvious.Viewed from a global level, when using the method presented in the paper for outlier data mining, the average mining efficiency is about 96.8%, while the average mining efficiency of the traditional knowledge granularity method and that of the support vector machine method are about 70.9% and 76.9%.The method presented in the paper shows improvement of 36.53% and 25.87% over the two methods.It is demonstrated that the method presented in the paper shows an absolute predominance for outlier data mining efficiency.
As shown in Figure 15, under the same number of trials and with uncertain data volumes, the outlier data mining in a mobile Internet-based large real-time database using the proposed method shows higher mining stability than the traditional knowledge granularity method and the support vector machine method.As the number of trials increases, the advantage of the proposed method becomes more obvious.Viewed from a global level, when using the proposed method for outlier data mining, the average mining stability is approximately 96.37%, while the average mining stability of the traditional knowledge granularity method and that of the support vector machine method are approximately 69.84% and 76.23%, respectively.The proposed method shows a stability improvement of 37.98% and 26.42% over the compared methods, respectively.This result demonstrates that the proposed method is predominant for outlier data mining stability.
As shown in Figure 16, with uncertain data volumes, the outlier data mining in a mobile Internet-based large real-time database using the proposed method results in a shorter mining time than the time required by the traditional knowledge granularity and support vector machine methods.As the amount of data increases, the advantage of the proposed method becomes more obvious.Viewed from a global level, when using the proposed method for outlier data mining, although there is relatively high fluctuation, the average mining time for the improved method-based outlier data mining is approximately 15.84 s, while the average mining times of the traditional knowledge granularity and support vector machine methods are approximately 31.23 s and 27.61 s, respectively.The proposed method improves the mining time by 15.39 s and 11.77 s over the compared methods, respectively.This result demonstrates that the proposed method is predominant for outlier data mining time.

Conclusion
Outlier data mining in a mobile Internet-based large realtime database using traditional methods is prone to generating mass interference data and reducing the accuracy, efficiency, and stability of data mining, all of which are severe deficiencies.To address these issues, this paper presents a decision-tree outlier-classification feature-filtering detectionbased method for outlier data mining in a mobile Internetbased large real-time database.The method is used to analyze features of real-time data, obtain magnitude spectra models of outlier data, and conduct preliminary analysis on signals of outlier data.A decisional-tree information chain transmission model for outlier data existing under mobile Internet conditions is established to precisely cluster mobile and scattered data, obtain outlier data-containing information chains, and transmit them into the real-time database in an orderly manner.Outlier data-containing information flows are obtained from the information chains in the large realtime database and then clustered to improve the precision of subsequent mining, significantly reduce the complexity of mining computation, and lay a foundation for the subsequent division of the confidence interval.Consequently, the mining method is subsequently improved by acquiring the phase position features of prefiltered outlier data in outlier data-containing information flows.The decision-tree outlierclassification feature-filtering algorithm is adopted to obtain analytical signals and instant amplitude, and the decision-tree filtering method is used to remove useless high-and lowfrequency components and to obtain the phase-frequency features of the outlier data.The WT threshold denoising method is integrated to perform signal denoising.Then, the data offset degree is analyzed.The results of simulation experiments indicate that the method significantly reduces mining response time, the number of required iterations, and the error rate and improves the fitness of precise mining.The formed detection filtering model is corrected and the simulation experiments indicate that the precise coverage and probability of outlier data mining are effectively improved.This approach achieved outlier data mining in a mobile Internetbased large real-time database and yielded favorable outlier data mining effects.With respect to performance, the proposed method was compared with the traditional knowledge granularity method and the support vector machine method regarding compactness, accuracy, efficiency, stability, and time of outlier data mining as well as clustering.The results showed the absolute superiority of the proposed method for outlier data mining.

Figure 1 :
Figure 1: Transmission model for outlier-data-carrying decision-tree information chain under mobile Internet conditions.

Figure 2 :
Figure 2: Outlier data signal model obtained using the traditional method.

Figure 3 :
Figure 3: Time domain sequence waveform of the original outlier data information flows.

Figure 4 :Figure 5 :
Figure 4: Time domain sequence waveform of outlier datacontaining information flows obtained by the proposed method.

Figure 6 :
Figure 6: Directional clustering results of outlier data-contained information flows under MOC algorithm.

Figure 7 :Figure 8 :
Figure 7: Curve of outlier data feature state response distribution detected with dynamic scheduling of information flows (the proposed method).
(a) Simulation of outlier data mining based on the proposed method (b) Simulation of outlier data mining based on the traditional method

Figure 9 :Figure 10 :
Figure 9: Cloud picture comparison of outlier data mining in information flows of a large real-time database.

Table 1 :
Parameters used to classify outlier data with the decision-tree in large real-time databases.

Table 2 :
Parameters of the simulation experiments.
treatment is applied, and the wavelet inverse transformation is utilized to remove interference generated by noise.The length of outlier data signal is assumed to be , and   is the standard deviation at the th layer of noise contained by each intrinsic mode function.According to the above analysis, the decision-tree outlier-classification feature-filter algorithm-based method for outlier data mining is improved.The mining accuracy, mining efficiency, mining stability, and time efficiency of the improved outlier data mining method are further verified through a simulation experiment.4.

Table 3 :
Times and errors of outlier data feature state responses detected with the proposed method.

Table 4 :
Times and errors of outlier date feature state responses detected with the traditional method.

Table 5 :
Number of iterations and fitness of outlier data feature-state responses detected with the traditional method.

Table 6 :
Number of iterations and fitness of outlier data feature-state responses detected with the proposed method.