COMP5331Knowledge Discovery in Databases- Assignment Problem

Assignment Help Management Information Sys
Reference no: EM132384307

COMP5331 Knowledge Discovery in Databases

Question 1

(a) In general, we have a number of customers. For illustration, we are given two customers, namely X and Y. The following shows 5 transactions for these two customers. Each transaction contains three kinds of information: (1) customer ID (e.g., X and Y), (2) the time that this transaction occurred, and (3) all the items involved in this transaction.

Customer X, time 1, items A, B, C

Customer Y, time 2, items A, F

Customer X, time 3, items D, E

Customer X, time 4, item G

Customer Y, time 5, items D, E, G

For example, the first transaction corresponds to that customer X bought item A, item B and item C at time 1, while the last transaction corresponds to that customer Y bought item D, item E and item G at time 5.

A sequence is defined to be a series of itemsets in form of <S1, S2, S3, …, Sm> where Si is an itemset for i = 1, 2, …, m. The above transactions can be transformed into two sequences as follows.

X: <{A, B, C}, {D, E}, {G}>
Y: <{A, F}, {D, E, G}>

After this transformation, each customer is associated with a sequence.

Given a sequence S in form of <S1, S2, S3, …, Sm> and another sequence S’ in form of <S1’, S2’, S3’, …, Sn’> , S is said to be a subsequence of S’ if m ≤ n and there exist m integers, namely i1, i2, …, im, such that (i) 1≤i1<i2< …< im≤n, and (2) Sj ⊆ Sij’ for j = 1, 2, …, m. If S is a subsequence of S’, then S’ is defined to be a super-sequence of S.

The support of a sequence S is defined to be the total number of customers which sequences are super- sequences of S.
 
Given a positive integer k, a sequence in form of <S1, S2, S3, …, Sm> is said to be a k-sequence if
Σ m|Si|=k.
i=1

Can the Apriori algorithm be adapted to mining all k-sequences with support at least 2 where k = 2, 3,  4, …. ? If yes, please write down the proposed method using the concept of the Apriori algorithm and illustrate your algorithm with the above example. If no, please explain the reason.

(b) We want to study the same problem setting described in (a). However, each customer is associated to one binary attribute called “Rich” to indicate whether this customer is rich or not. There are only 2 possible values in this attribute, namely “Yes” and “No”. In our example, customer X could have “Yes” in attribute “Rich” and customer Y could have “No” in attribute “Rich”.

Given a k-sequence s and a value v in attribute “Rich”, the support of a sequence S with respect to value v is defined to be the total number of customers which sequences are super-sequences of S and are associated with value v in attribute “Rich”. The important ratio of s is defined to be the support of s with respect to value “Yes” divided by the support of s with respect to value “No”.

Can the Apriori algorithm be adapted to mining all k-sequences with important ratio at least 2 and the support at least 1 where k = 2, 3, 4, ….? If yes, please write down the proposed method using the concept of the Apriori algorithm and illustrate your algorithm with the above example. If no, please explain the reason.

Note that when we compute the important ratio, if we encounter a division of a non-zero number by zero, we could regard it as a positive infinity value.

Question 2

Given a positive integer K, we denote SK to be a set of K-itemsets with support at least 1.

Given a positive integer K and a positive integer l, we define a set SK, l which is a subset of SK such that  each K-itemset in SK, l has its support at least sl where sl is the l-th greatest value in the multi-set of the supports of all K-itemsets in SK. For example, the second greatest value in a multi-set of {4, 4, 3, 2} is 4 while the second greatest value of another multi-set of {4, 3, 3, 2} is 3.

We are given six items, namely A, B, C, D, E and F.

Suppose l is fixed and is set to 2.

We want to find SK, l for K = 1, 2 and 3.

The following shows four transactions with six items. Each row corresponds to a transaction where 1 corresponds to a presence of an item and 0 corresponds to an absence.

A

B

C

D

E

F

0

0

1

1

0

0

0

1

0

0

1

1

1

0

1

1

0

0

1

0

1

1

0

0


(a)  (i) What is S1, 2?

(ii)  What is S2, 2?

(iii) What is S3, 2?

(b) Can algorithm FP-growth be adapted to finding S1, 2, S2, 2 and S3, 2. If yes, please write down how to adapt algorithm FP-growth and illustrate the adapted algorithm with the above example. If no,  please explain the reason.

(c) There are two parameters of finding SK, l. They are K and l. In the traditional problem of finding frequent itemsets, we need to provide only one parameter, a support threshold.

It seems that it is troublesome to set one more parameter in the problem of finding SK, l (compared with the traditional frequent itemset mining you learnt). What are the advantages of the problem of finding SK, l compared with the traditional problem?
 
Question 3

(a) One disadvantage of method k-means is that k (i.e., the number of clusters) should be pre-determined. One may suggest the following method to determine parameter k.

• Step 1: Set variable e0 to ∞

• Step 2: Set k to 1 initially

• Step 3: Run the original k-means method and obtain k cluster centers (or means)

• Step 4: Set variable ek to the sum of the distances between points and their closest cluster centers (according to the k cluster centers found).

• Step 5: If ek converges (i.e., (ek-1 – ek) is equal to 0 or an extremely small number), then return k. Otherwise, increment k by 1 and repeat Step 3 to Step 4.

Can the above method determine a good value for k (i.e., the number of clusters)? Please explain.

If your answer is no, please also give an algorithm to determine a good value for k and explain why it is better than the above method.

(b) In a typical setting for k-means, we calculate the distance between a point and a cluster by computing the Euclidean distance between a point and the center (or mean) of the cluster.
However, this computation method can only capture “circular” clusters as shown below.

819_b1.jpg

In some cases, clusters are not “circular”. Instead, they may appear as lines as shown below.

1535_b2.jpg

Please give a method or a distance function to capture both the “circular” clusters and the “appear-as- line” clusters.
 
Question 4

(a) Consider the following eight two-dimensional data points:

x1:(20, 15), x2: (8, 15), x3: (20, 17), x4: (8, 19), x5: (23, 18), x6: (6, 12), x7: (15, 6), x8: (15, 35)

(i) Assume that we adopt the Euclidean distance metric as the distance between any two points. Please write a matrix where its entries correspond to the pairwise distances between any two points.

(ii) Please  use  the  agglomerative  approach  to  group  these  points  with   centroid   linkage.  Draw the corresponding dendrogram for the clustering. You are required to specify the distance metric in the dendrogram.

(b) According to (a), we have eight data points. Suppose that we have one more data point. Totally, we have nine data points. Is it possible for you to design an algorithm so that the dendrogram obtained in (a) could be updated efficiently? If yes, please give a step-by-step algorithm. Otherwise, please elaborate in detail.

Question 5

In the class, we learnt algorithm DBSCAN with 4 principles on a given dataset.

(a)  Please write down a pseudo-code in order to perform clustering according to these 4 principles.

(b) Suppose that the dataset is updated from time to time.

(i) Please give a pseudo-code in order to perform clustering according to these 4 principles on this updating dataset. It is expected that the algorithm should return clustering results based on both the information stored based on the past data together with the new data.

(ii) Please analyze the time complexity of the algorithm.

Reference no: EM132384307

Questions Cloud

Analyze health risks and health care needs : Analyze health risks and health care needs among distinct populations. Explain how an organization's work impacts the health and/or safety needs of a local.
Academic literature relating to communication practices : how should the new employees communicate and how they should not communicate within the Australia workplace - Individually Written Essay
Which countermeasures should use to prevent cyber attack : Create a new thread. As indicated above, discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above.
Have you ever interacted people in the us : Any perceptions Have you ever interacted/encountered people from this country here in the US? Now, research their culture, history and common health related.
COMP5331Knowledge Discovery in Databases- Assignment Problem : COMP5331: Knowledge Discovery in Databases Assignment Solutions and Help-Hong Kong University of Science and Technology-
EE336 Junior Design Assignment Problem : EE336: Junior Design Assignment help and solution, PCB Design Assessment help - assignment is to introduce the student to printed circuit board design.
Business environment- initial statement of intent assignment : Business Environment- Initial Statement of Intent Assignment help, Develop and apply a conceptual understanding of reflective practice in a business context
Critiquing a canadian health article : Describe and evaluate activities you partake in over a typical week - Evaluating your overall health based on these various dimensions and measures of health
What is secondary data and why is it being used : What is secondary data and why is it being used ex: existing data collected by someone else and they are used for convenience and low cost.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Measure the level of internet security or privacy

What metrics can we use to measure the level of Internet security or privacy in our organization

  Write similar research report describing sap key erp systems

AS a contrast to the Oracle research paper in Module 7, write a similar research report describing SAP key ERP systems. Your report should include a description of each ERP.

  Prepare a report on how technologies are blurring

Prepare a report on how technologies are blurring the boundary between the physical and digital worlds with Common-Use Systems.

  What effect this has on the economic arguments you

Are there any business-related, regulatory or other non-economic factors that could significantly affect the economic arguments you have put forward?

  Describe the importance of maintaining integrity rules

Many times, database designs do not include the proper use of indexes. Provide a specific example on how an index could be used in order to enhance user search experience. List specific fields that you would index. Analyze what would occur if the ..

  Describe performance measurement tools that are both broad

describe performance measurement tools that are both broad in scope and yet summarized in a few key indicators. in this

  Research on a local healthcare business

Select one short-term executable project supported by the Gemba and data collection. Create a 1page SBAR Proposal

  Explain negligence and misrepresentation

Describe warranty requirements and explain the three common types of warranties.Describe what product liability means.

  Explain preferred operating systems

Preferred Operating Systems - Do you agree or disagree with this sentiment? In your response to Software include your preference of operating system.

  Research a company that uses supply chain management

Research a company that uses supply chain management (SCM) and look at how their organizational profitability is affected by it. Research a company that uses supply chain management. Be sure to review your lessons and assigned readings.

  Provide an explanation by using a crime theory

Provide an explanation (one page) by using a crime theory (e.g. labeling, broken windows, situational perspective, rational choice and so on) that will help analyze the media and the data you gather from the FEDS sources. You must cite four refere..

  Write a console-based c++ program that requests the user

Write a console-based C++ program that requests the user to input a single positive integer as input and waits until the student presses the Enter key:Please enter number, then press Enter key: 8.The program will then write the following output acc..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd