Linear decision boundary in transformed space

Assignment Help Basic Computer Science
Reference no: EM132664088

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, -),(1, 0, +),(0, 1, +),(0, 0, -). Transform the data into the following feature space:

Φ = (1, √ 2x1, √ 2x2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

Reference no: EM132664088

Questions Cloud

What arguments could be made for the opposite side : Distinguish between protected and unprotected conduct under the National Labor Relations Act. Choose the side of the employer or employee.
Company took to achieve operational excellence : Explain what actions the company took to achieve operational excellence.
ICT115 Introduction to system design Assignment : ICT115 Introduction to system design Assignment Help and Solution, University of the Sunshine Coast - Assessment Writing Service
Determining the stock value-airlines inc : After 3 years the dividend is expected to grow at the rate of 4% indefinitely. If the required return is 9.8%, what is the stock's value today?
Linear decision boundary in transformed space : Identify at least two advantages and two disadvantages of using color to visually represent information.
What policies and procedures should Johnson Computers have : What policies and procedures should Johnson Computers have in place to protect the business assets and prevent the business risk
Implement typical solution use cases in big data context : Implement typical solution use cases in big data context using technologies such as MapReduce and Spark Framework and using ecosystems
How would you develop the sales budget : You as the sales manager want to ensure you and your team will receive the maximum bonus. How would you develop the sales budget
Review security breach which occurred : Describe the incident. What data or information was impacted? How can the organization be better postured for future attacks?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Corporate bond issued by johnson corporation

A corporate bond issued by Johnson Corporation currently yield 8%, The Municipal bond of equal risk currently yield 6%.

  Why would the other architectures not be a good choice

Why would the other architectures not be a good choice?

  Code using a java library utility

Using Notepad, write some usable code that demonstrates the use of the command line compiler to compile the code into a java.class file. Place at least one debug line in the code using a Java library utility such as printf. Be sure to upload both ..

  Aspects of the online environment

What aspects of the online environment make it easier to effectively communicate? What aspects of the online environment makes it harder?

  Important to an information security program

Explain why the principle of defense in depth is so important to an information security program.

  Souurce of mac address for all frame sent from host a

Host A want to send data to Host B.Host B is an different segment from Host A. The two segment are connected through router.What will host B see as souurce of MAC address for all frame sent from Host A

  Race result and a current world record time

Design a function that will take a race result and a current world record time and determine if the world record was beaten.

  Is technology a blessing or a curse

In the article the author discusses "the two-edge sword" of using computer technology in communication. How has the ability to communicate via computer technology affected your life?

  Booted suspect computer

Sometimes you need to see how an application works and behaves on a booted suspect's computer.

  Allow potential customers to view all of your products

Try to be consistent in the naming of your files as this will help you later on. Add appropriate comments to your code as we covered in lecture.

  Write a function to compute n! using recursion

Recursion: Write a function to compute n! using recursion. (Note that this is not the most efficient way to compute n!. However, it is conceptually a recursive calculation that is easy to implement and test recursion in MATLAB.)

  What are the causes of bucket overflow in a hash file

What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd