Implement an anomaly detection algorithm

Assignment Help Computer Engineering
Reference no: EM131900292

Programming Exercise: Anomaly Detection and Recommender Systems

Introduction

In this exercise, you will implement the anomaly detection algorithm and apply it to detect failing servers on a network. In the second part, you will use collaborative filtering to build a recommender system for movies. Before starting on the programming exercise, we strongly recommend watching the video lectures and completing the review questions for the associated topics. To get started with the exercise, you will need to download the starter code and unzip its contents to the directory where you wish to complete the exercise. If needed, use the cd command in Octave/MATLAB to change to this directory before starting this exercise.

You can also find instructions for installing Octave/MATLAB in the "Environment Setup Instructions" of the course website.

1 Anomaly detection

In this exercise, you will implement an anomaly detection algorithm to detect anomalous behavior in server computers. The features measure the throughput (mb/s) and latency (ms) of response of each server. While your servers were operating, you collected m = 307 examples of how they were behaving, and thus have an unlabeled dataset x(1), . . . , x(m). You suspect that the vast majority of these examples are "normal" (non-anomalous) examples of the servers operating normally, but there might also be some examples of servers acting anomalously within this dataset.

2 Recommender Systems

In this part of the exercise, you will implement the collaborative filtering learning algorithm and apply it to a dataset of movie ratings.2 This dataset consists of ratings on a scale of 1 to 5. The dataset has nu = 943 users, and nm = 1682 movies. For this part of the exercise, you will be working with the script ex8 cofi.m.

In the next parts of this exercise, you will implement the function cofiCostFunc.m that computes the collaborative fitlering objective function and gradient. After implementing the cost function and gradient, you will use fmincg.m to learn the parameters for collaborative filtering.

Attachment:- Anomaly Detection and Recommender.rar

Reference no: EM131900292

Questions Cloud

Prehistoric and mesopotamian art : Please compare and contrast the Ziggurat at Ur with the Stepped Pyramid of Djoser. What is the significance of the Stepped Pyramid?
Calculate the overhead rates for each department : Calculate the overhead rates for each department. How does this compare with the plantwide rate unit cost, using direct labor hours?
Demonstrate the wide-ranging differences in the lives : Demonstrate the wide-ranging differences in the lives, rights, and roles of women and men in the various strata of Greek and Roman societies.
How many full items can be produced in a work day : How many full items can be produced in a work day (7 hours and 15 minutes)? This must be a whole number (round down if necessary).
Implement an anomaly detection algorithm : Implement an anomaly detection algorithm to detect anomalous behavior in server computers. The features measure the throughput
Various greek and roman forms of government : Compare and contrast the development of the various Greek and Roman forms of government, demonstrating their impact on modern western forms of government.
How would the payment differ if you paid interest only : How would the payment differ if you paid interest only? (Do not round intermediate calculations and round your final answer to 2 decimal places.)
Calculate the present value of future earnings : In order to have effective executive leadership in innovation, senior management MUST be involved in day-to-day project management.
What is the amount of goodwill from parent investment : Any excess cost over fair value is attributable to goodwill with an indefinite life. What is the amount of goodwill from Parent's investment in Sub

Reviews

len1900292

3/13/2018 7:27:56 AM

After completing various parts of the assignment, be sure to use the submit function system to submit your solutions to our servers. The following is a breakdown of how each part of this exercise is scored. Part Submitted File Points Estimate Gaussian Parameters estimateGuassian.m 15 points Select Threshold selectThreshold.m 15 points Collaborative Filtering Cost cofiCostFunc.m 20 points Collaborative Filtering Gradient cofiCostFunc.m 30 points Regularized Cost cofiCostFunc.m 10 points Gradient with regularization cofiCostFunc.m 10 points Total Points 100 points You are allowed to submit your solutions multiple times, and we will take only the highest score into consideration.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd