How many covid vaccine doses have administered by states

Assignment Help Computer Engineering
Reference no: EM133677580

Homework: Data Science

Part I

This dataset contains State-by-state data on COVID-19 vaccinations in the United States from 1/2/2021 to 8/2/2021. You will be required to answer the following questions by timeseries analysis.

For vaccines that require multiple doses, each individual dose is counted. As the same person may receive more than one dose, the number of doses can be higher than the number of people in the population.

Don't forget to check the null values, and decide what to do with them.

A. How many COVID-19 vaccine doses have been administered by states daily? You are only required to answer two states by providing the visualizations.

B. The top 10 states that distributed the largest number of vaccines between 5/1/2021 and 5/7/2021? Visualization or Table.

C. Which state was the state that distributed the most vaccines per 100 people between 5/1/2021 and 5/7/2021? Visualization or Table.

Part II

Market Basket Analysis is one of the key techniques used by large retailers to uncover associations between items. It works by looking for combinations of items that occur together frequently in transactions. To put it another way, it allows retailers to identify relationships between the items that people buy.

Association Rules are widely used to analyze retail basket or transaction data and are intended to identify strong rules discovered in transaction data using measures of interestingness, based on the concept of strong rules.

Find the answers of the following question:

A. Top 20 frequently bought products. (Visualization as the answer is preferred.)

B. Use the apriori algorithm, find the top 10 popular itemsets by support, lift, and confidence. You need to interpret each result. (Visualization or table)

General requirements (as always):

A. You will need to write up your findings, interpretations, and results for this homework. You can put two parts of this homework in one paper. It will be a great idea to screenshot your codes, results, and graphs so that you can explain your findings along with them. (It is also easier for me to follow you when I read your paper). A pdf file is required. There is no page limit but try to be straightforward with your answers.

B. The py files that you have used to finish your homework. (It may be a duplicate or somewhat duplicate of the screenshots that you have inserted in your paper but that is okay. I would like to look over your codes.)

Reference no: EM133677580

Questions Cloud

What is meant by test coverage : What is meant by Test Coverage? Is it usually impossible to test all possible combinations of input values in order to guarantee some code is correct?
Describe the conflict management style : Suppose you do agree, please describe why. If you disagree, please describe the conflict management style you believe more closely aligns with you.
Discuss two of most interesting elements commonly addressed : Discuss two of the most interesting elements commonly addressed in a Bring Your Own Device policy definition. Mention why they are interesting to you.
Higher-wage jobs in the same industries : During the Great Recession of 2008, 60% of job losses were in medium-wage occupations. higher-wage jobs in the same industries. lower-wage jobs in manufacturing
How many covid vaccine doses have administered by states : How many COVID-19 vaccine doses have been administered by states daily? You are only required to answer two states by providing the visualizations.
Developing network diagram : Tracie wants you assistance in developing the network diagram, which includes the following: the complete network diagram computed early start times
How do you protect employers domain name from being hijacked : Name three problems with cabling and the methods to counteract those issues. How do you protect your employer's domain name from being hijacked?
Deescalate potential conflicts : It is always important to deescalate potential conflicts if officers were to never at least try to deescalate anything it would be just anarchy
Develop a strategy for enhancing it healthcare usage : Develop a strategy for enhancing IT healthcare usage. Perform an analysis using quantitative measures to determine the proper course of action.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a piece of code that prompts the user for number

Write a piece of code that prompts the user for number of days, hours, minutes, and seconds (in that order).

  How these tools are selected and implemented

During this course, many concepts, methods, and technologies have been introduced and explored. Has this course changed your thoughts about the tools

  The difference between quality assurance and quality control

Briefly describe the Perform Quality Assurance Tools and Techniques. What is Quality Audit?

  Discuss the requirements of a linear programming

Discuss the requirements of a linear programming (LP) model. Provide an example of an LP model and define each variable used. What are the key steps that need to be considered when formulating an LP problem

  What tips for additional computer maintenance

What did you learn while completing these steps? Why is it important to complete each of these tasks? What Tips for additional Computer Maintenance could you

  Draw a barplot of the sample

Draw a barplot of the sample. Calculate the mean, standard deviation and variance of the sample.

  Do some research on threat response software

Do some research on Threat Response software. Find one particular software package to investigate. What does the software do?

  Define an example of a one-to-one relationship

Look for an example of a one-to-one relationship, an instance of a one-to-many relationship, and an example of a many-to-many relationship in a newspaper, magazine, book, or everyday situation you encounter.

  Identify and list all primary functional requirements

COIT 20248: Information Systems Analysis and Design - Identify and list all primary functional requirements for the system in the case study

  What are the biggest cybersecurity threats in your industry

What are the biggest cybersecurity threats in your industry? How can you manage these threats? For me personally, right now I am a stay-at-home mom.

  What mechanisms can a virus use to conceal itself

What mechanisms can a virus use to conceal itself? What is the difference between machine-executable and macro viruses? What means can a worm use to access.

  Develop a linear optimization model

Develop a linear optimization model to determine how many of each type of unit the developer should build.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd