Retail chain as a data miner

Assignment Help Basic Computer Science
Reference no: EM132302280

Please explain the characteristics of each constraint such as monotone, anti-monotone, succinct, convertible etc.

You are hired by a retail chain as a data miner. Suppose the manager is interested only in frequent patterns (itemsets) with one of the following constraints:

  1. The sum of the price of all the items (in each pattern) is between $100 and $200.
  2. The price difference between the most expensive item and the cheapest one in each pattern must be less than or equal to $100.
  3. The average price of all the items in each pattern is less than $10.

State the characteristics of each constraint (monotone, anti-monotone, succinct, convertible, etc.) and briefly explain how to mine such patterns efficient

Reference no: EM132302280

Questions Cloud

How many ones would be in the network mask : Suppose a network administrator wants to place 64 subnets on a /19 network.
Democratizing purpose or an indoctrinating one : Does mass media serve a democratizing purpose or an indoctrinating one? Or both? Explain your answer fully with specific examples.
Different hci methods of usability inspections : Can you pls give me a guide or direction on how to answer these questions? 1. List and explain in detail the two different HCI methods of usability inspections
Existing transaction database tdb : Suppose that we have an existing transaction database TDB for which we have already mined the frequent patterns. Also we have a new set of transaction ?TDB
Retail chain as a data miner : You are hired by a retail chain as a data miner. Suppose the manager is interested only in frequent patterns (itemsets) with one of the following constraints:
How long will one loop iteration take in a single-cycle : a. How long will one loop iteration take in a single-cycle datapath? b. How long will one loop iteration take in a multi-cycle datapath?
Write n assembly procedure to sort : How to Write n assembly procedure to sort the following array into numerical order and print the resulting array.
First and last name printed out in the main function : It will then return the first and last name. This function should also be called by the main and the first and last name printed out in the main function.
Exception classes for badhour and badseconds : Create exception classes for both BadHour and BadSeconds that each have a private variable to hold the bad data, along with any needed methods.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss why an organization might elect to use a separate

Why is the system-human interface one of the most important but difficult areas of safety-critical systems? Do a search on the Internet and find three good sources of information relating to how to design an effective system-human interface.

  Generations of computer programming languages

Briefly describe the four generations of computer programming languages, concentrating on the major differences among the generations. How does object-oriented programming fit into these generations? How does HTML fit into these generations?

  Managing security assessments

Explain the role of Project Management as it relates to managing Security Assessments; what are the key phases for managing a security assessment, describe each phase, explain how project management supports each phase

  Advantages and disadvantages of building

Describe how you would spend those five minutes in presenting the most important element of the decision. List and describe the advantages and disadvantages of building a system from the ground up.

  Marginal corporate tax rate

For MAMA, the required return on debt is 7%, the required return on equity is 7.8%, and the marginal corporate tax rate is 32%. To the nearest $1000, the NPV of this investment is then:

  Information for a monopoly firm

Use the following information for a monopoly firm to answer questions 27 through 29. Assume that Q equals the level of output and all costs are economic costs.

  Explain the return type of string

Prior to Java 1.5, if you needed a list of Strings, there were at least two approaches you could take. The first approach was to create an object.

  Linear programming model to be formulated and used

What are the assumptions for a linear programming model to be formulated and used?

  How is a push technology environment different

How is a push technology environment different from mass mailings and spam - disadvantages of using mass mailings and spams. Be specific and provide examples

  Give a recursive algorithm that generates

Give a recursive algorithm that generates a similar series of coins for changing n cents. Don't use dynamic programming for this problem.

  Various racial and ethnic categories

1. Why do various racial and ethnic categories of the U.S. population have different social standing? 2. How well informed were you regarding end of life care before taking this course?

  What are the two types of line configuration

What are the three criteria necessary for an effective and efficient network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd