Outline the k-means clustering algorithm

Assignment Help Management Information Sys
Reference no: EM13960766

(a) The K nearest neighbour (KNN) algorithm uses a distance metric to order the training data in relation to a given test example. Given a problem with data in the form (x1,.....,xn,Y), where are independent variables, and y is the dependent variable for prediction, describe and explain an approach to weighting the k nearest neighbours so that nearer neighbours are more important when producing the final predicted y value for a test example.

(b) Outline the k-means clustering algorithm for a set of data defined as vectors xi. Include a diagram to support your algorithm description.

(c) Explain why the k-means clustering algorithm does not guarantee finding the optimal cluster locations for any given application of the algorithm. Given this non-optimal clustering, what does this imply in terms of how k-means should be used in practice to ensure a good clustering?

Reference no: EM13960766

Questions Cloud

Factor analysis project : Factor analysis project, Prepare a report of the results of 2 and a half double-spaced pages along with tables associated with the results. Also include a log stating the steps used in the research, and any pertinent SPSS printouts.
Refer to the template spreadsheet provided : Refer to the template spreadsheet provided.  Stock A has an annualized volatility equal to 18% for which you have just written an out-of-the-money 26 week call option.  The risk free rate is 2% per annum and the strike price is $100.  There is anothe..
Revenue recognition : Revenue Recognition -  Suppose for purposes of this question that Cisco closes its books quarterly.  What journal entry or entries did Cisco make on October 31, 2011?
Prepare a tax memo on these issues : Prepare a tax memo on these issues (no more than four pages), to the tax partner on this engagement, Robert Holder.  You need to read Sections 382 and 108 and the related regulations to develop your solution.
Outline the k-means clustering algorithm : Outline the k-means clustering algorithm for a set of data defined as vectors xi. Include a diagram to support your algorithm description.
Explain the role of sensitivity analysis : Explain the role of sensitivity analysis in terms of understanding the properties of a model. In particular, address the issue of how variation in model inputs can be assessed, and why this is important.
Venture capital and private equity : Venture Capital and Private Equity. You have decided to begin a new venture and are armed with an understanding of the market for your products or services. How do you figure out what resources (financial and nonfinancial) you will need to bring that..
Principal technologies and standards for wireless networking : What are the principal technologies and standards for wireless networking, communications, and Internet access? Define Bluetooth, wi-fi, WiMax, and 3G and 4G networks. Will these standards last until 2025? How often should they be updated?
What is the consumer product safety database : What is the Consumer Product Safety Database (CPSC) What problems are raised by this database? Why is it so controversial? Why is data quality an issue? Name two entities in the CPSC database and describe some of their attributes.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Risk, return and portfolios in general

Risk, return, and portfolios in general. Technology stocks in particular - How would you respond to such a comment?

  Which aspects or areas of a project plan are more likely to

which aspects or areas of a project plan are more likely to be affected by risk responses? how do risk responses affect

  Value chain configuration is increasingly inadequate as a

value chain configuration is increasingly inadequate as a means to describe how an organization organizes and operates

  Copyright and a patent on a computer program

Copyrights and Patents for Computer Programs - Show the difference between a copyright and a patent on a computer program?

  What you have learned about informatics systems

Consider what you have learned about informatics systems and how we use data to improve patient care and decrease costs. How is data collected, stored, and used to protect patients and improve care

  Americans and selling privacy and information online

Americans and selling privacy and information online - simultaneously craving private information about one another.

  About information systems

In this essay, you will analyze five Google technologies that are current under research and development, including the self-driving automobile and four other technologies of your choice.

  Name and describe two safeguard utilized for system security

Name and describe two safeguard utilized for system security and Explain why health IT privacy and security standards are important

  1 explain why someone with a serious medical condition be

1. explain why someone with a serious medical condition be concerned about researching his or her condition online

  What new hardware components are you looking

What kind of hardware components are you using or have used with this personal computer? What new hardware components are you looking

  Assignment on risk management plan

Assignment on Risk Management Plan

  Design a sic receiver

Using capacity achieving channel codes, design a SIC receiver that achieves the (R1, R2) which is located in cue of the right-hand corner of the pentagon region

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd