Robust Estimations of Cluster Analysis: Practical Application in Administrative and Financial Corruption
DOI:
https://doi.org/10.33095/jeas.v18i69.933Keywords:
التحليل العنقودي, : Cluster analysisAbstract
Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.
Outliers and infected data of the well-thought phenomenon have led to inaccurate results that were highlighted by the cluster analysis process made on the infected data. This gave rise to adopt efficient estimation methods known as the Robust Methods, which are used when the deliberate phenomenon-related data is infected due to certain outliers. Thus, this paper is purposed to obtain robust estimations that are functional in determining the robust distances for elimination of outlier and data cleansing by means of certain robust methods the stahel-donoho estimator.
Downloads
Downloads
Published
Issue
Section
License
Articles submitted to the journal should not have been published before in their current or substantially similar form or be under consideration for publication with another journal. Please see JEAS originality guidelines for details. Use this in conjunction with the points below about references, before submission i.e. always attribute clearly using either indented text or quote marks as well as making use of the preferred Harvard style of formatting. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed.
The editor may make use of Turnitin software for checking the originality of submissions received.