Skip to main content

Table 3 Pseudo-code for the second part of Step 1 Algorithm

From: Data mining application to healthcare fraud detection: a two-step unsupervised clustering method for outlier detection with administrative databases

View full size image

Â