Identify clusters and describe their centroids and business

Assignment Help Computer Engineering
Reference no: EM133360606

Question: Use of the cluster analysis in predictive analytics can be described as follows:

Using existing data we can identify clusters (groups) in data. Each cluster may be described in data terms (using cluster centroids etc.), and each cluster can be explant in terms of its business meaning.

Then when a new data arrives it can be tested to identify which cluster is the closest, which will suggest that the new data belongs to this cluster.

Directions:

  1. Pick any dataset relevant to your major that you would like to analyze. Avoid use the same or similar datasets to one you use for your final project.
  2. Randomly divide it into two chunks 80% and 20% of records.
  3. Select input variables (2 min) that you will use for cluster analysis. Provide reasoning for the selection.
  4. Use SPSS or other tool to apply appropriate cluster analysis method to clusters the larger part of the dataset.
  5. Identify clusters and describe their centroids and business meaning.
  6. If classes are poorly identified by the analysis or their business meaning is hard to describe. Change your variable selection and go to the step 3.
  7. For at least 5 records from the remaining smaller part of the dataset identify the closest cluster centroid. That will be a prediction which cluster those records belong too. Note that they have not been used in cluster identification, therefore this prediction will qualify as an example of predictive analytics.
  8. Submit a Word report describing each step and a result of this process, include relevant scripts and outputs produced by the tool you use.

Reference no: EM133360606

Questions Cloud

Buyer decision-making process : Explain how you went through the buyer decision-making process for your recent purchase of a high-involvement product
What source of differentiation has bmw achieved : What source of differentiation has BMW achieved? Multiple Choice personnel convenience image price.
What is your opinion of denyer viewpoint concerning database : Read an article by Charles Denyer Best Practices for Database Security. What is your opinion of Denyer's viewpoint concerning Database Security Best Practices?
Laurie is avid consumer of conservative news : Laurie is an avid consumer of conservative news and never watches a program that conflicts with her beliefs.
Identify clusters and describe their centroids and business : Using existing data we can identify clusters (groups) in data. Each cluster may be described in data terms (using cluster centroids etc.), and each cluster
Why should buy the firewalls from two different vendors : Your boss suggested installing two firewalls from one vendor. However, you believe that the company should buy the firewalls from two different vendors.
Canadian wealth management landscape : What are the major trends in the Canadian Wealth Management Landscape from the suppliers of capital as well as the users of capital? -
What journalists have reported about your company : Researching a company involves reading the news to see what journalists have reported about your company.
Successful global marketing product strategy : Explain what is a successful global marketing product strategy? Compare the different types of innovation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determine the e-r for the proposed system

Determine the E-R for the proposed system. Provide the timeframe for delivering the solution to the project. Proposed system Interfaces and Dialogues prototype including forms and reports.

  Search on the various office suites available in the market

Johanna is doing an online course in IT. She wants to submit her assignments to her instructor, who reviews them and provides feedback in the document. Johanna also wants to include charts, graphs, and diagrams in her assignments.

  Describe an efficient algorithm to find the minimum length

Draw a joint suffix tree for three strings ACTAC, ATCAT, TCACT. Label the edges and terminal nodes.

  List the materials of machining cutting tools

List the materials of machining cutting tools. Which is the softest and which is the hardest material? What is the effect of material strength on the tool.

  Describe the network penetration testing techniques

Do a bit of research on penetration testing techniques. Investigate and document the following: Five network penetration testing techniques.

  Write a java program that serves as a primitive web browser

For this assignment you merely need to input a server name and display the HTML that is sent by the web server.

  Discuss importance and advantages of using given techniques

According to Kirk 2016, in order to dissect the importance of data representation, we are going to "look at it from both theoretical and pragmatic perspectives.

  Current account balance is written

Rewrite the following async/await code without async/await. Instead of returning the new balance, assign it to a property balance

  What would a reasonable assumption for usage

What would a reasonable assumption for usage/load be? What would the minimum specs for cpu memory and disk be

  Write a java program that inputs a document

Write a Java program that inputs a document and then outputs a bar-chart plot of the frequencies of each alphabet character that appears in that document.

  Explain how the principle of implementation should include

Explain how the principle of implementation should include the shared possibility between the different designs and their implementation.

  Create a php file to access your mysql database

Use phpMyAdmin to create three tables in your MySQL WEB182 database on the server and Create a PHP file to access your MySQL database

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd