Investigate modeling techniques was requested

Assignment Help Management Information Sys
Reference no: EM132279210

Graded Assignment: Cluster Analysis

You work for a hypothetical university as an entry level data analyst and your supervisor has task you to learn more about the data mining process associated with modeling more specifically using cluster analysis following the steps below:

In the discussion this week, a task to investigate modeling techniques was requested and your supervisor has asked you to go further into the realm of modeling with a more in-depth investigation of cluster analysis. To get started, investigate some of the cluster analysis options in Rapid Miner Studio and research these types of cluster modeling techniques to determine comparisons among them and how they are used to support various types of decisions.

This portion and literature review of the paper should be a minimum of three to four pages of written content supported with a minimum of three academic sources of research.

After completing the literature review comparing types of cluster modeling techniques, use any of the sample data sets found in Rapid Miner Studio or data sets of choice to output results based on these rules and methods. As a tip to get started with ideas with selected data sets, go to "File" and then "New Process" and explore the example of price risk clustering.

Important Reminder: In support of this assignment, everyone should continue, as needed, working through model and validate video tutorials

Rapid Miner. (2018). Operator reference manual. Rapid Minder.

After creating, using and applying various association rules and methods on selected data sets, include any data visualizations from output deemed important and conclude the paper with a holistic view of these clustering techniques sharing types of decisions which could be made based on the output.

Do not worry about your decisions being right or wrong as the exercise is geared to further develop decision making skills based on data visualizations of modeling techniques. The conclusion of the paper in this case with proposed and developed decisions based on clustering methods should account for a minimum of one additional page of written content.

Once the overall paper is completed, remember that papers need to be professionally formatted using APA including an APA cover page, abstract, body pages, and reference page

Reference no: EM132279210

Questions Cloud

What is a pressing global issue in your industry : Today's leaders require the ability to confront global challenges impacting their respective industry. What is a pressing global issue in your industry.
Understanding process other than using process map : What are other ways of understanding a process other than using a process map?
What are impacts that flexible work schedules : What are impacts that flexible work schedules can have on a employee's productivity?
Organization took work-related disagreements to twitter : Two employees of your organization took work-related disagreements to Twitter and disciplinary action has been taken against both according to company policy.
Investigate modeling techniques was requested : You work for a hypothetical university as an entry level data analyst and your supervisor has task you to learn more about the data mining process associated.
Digital marketing techniques facilitate marketing : How does global marketing and the use of new digital marketing techniques facilitate marketing activities at the Olympics in Rio?
Business model for jpmorgan chase in 2008 : In the process, the bank gave enormous trading authority to one individual. What are the ERM strengths and weaknesses of this strategy?
Think about the client business case you are working on : Think about the client business case you are working on. What are some examples of what you can achieve from the regular meetings?
Describe the elements of the organization environment : Identify and describe the elements of the organization’s environment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss security measure to ensure protection of information

BZ380- Describe three ways in which information systems are transforming business. Discuss telecommunication operations and three security measures to ensure protection of information.

  Assess the impact that the freedom with fences concept

Reflect upon Robert Stephens' discussion of "Freedom with Fences" from Chapter 1 of CIO Best Practices. Discuss the implications of this concept on the CIO, the IT organization, and the technologies that are managed by the IT organization.Assess t..

  Identify possible risks constraints and assumptions

Describe the scope and analyze how to control the scope. Identify possible risks, constraints, and assumptions. Describe the integration with other systems and infrastructure. Note: Database and interface design, security, and networking should be ..

  Describing how technology is utilized in retail environment

Write a 350- to 750-word paper describing how technology is utilized in the retail environment. Consider how technology has impacted the retail business and its customers as a whole

  Summarize the process to implement the cis controls

Out of the list of twenty controls, pick the top two pertinent controls that every company should implement. Explain your reasoning.

  Demonstrate knowledge of information systems types

Students will demonstrate their knowledge of information systems types while using this document to communicate the required information.

  What are the limitations of sentiment analysis applications

Find at least three different movie reviews where the user also includes a score. For example customer movie reviews on Amazon and Netflix use a 5 star rating system. Copy and paste the text into the sentiment analysis demonstration software and..

  One concept in selecting a vendor is to have an rfp request

one concept in selecting a vendor is to have an rfp request for proposal. what are the components of an rfp? why is it

  The impact of social media on contemporary communication

"The impact of social media on contemporary business communication." Research, discuss and explain the fundamental opportunities and challenges that this creates for modern businesses

  Identify at least two data security measures

Suppose you are also in charge of securing your organization's data. Identify at least two data security measures that you believe are necessary to prevent data security issues. Justify your response.

  Create a list of five questions for clarification

Create a list of five (5) questions for clarification, the person you will be asking these questions (e.g., pharmacist, owner, customer, etc.).

  Where do you see business intelligence ten years from

Where do you see Business Intelligence and related technology 5 or 10 years from? What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd