Compute the cosine distance between each pair of users

Assignment Help Basic Computer Science
Reference no: EM131221461

In this exercise, we cluster items in the matrix of Fig. 9.8. Do the following steps.

(a) Cluster the eight items hierarchically into four clusters. The following method should be used to cluster. Replace all 3's, 4's, and 5's by 1 and replace 1's, 2's, and blanks by 0. use the Jaccard distance to measure the distance between the resulting column vectors. For clusters of more than one element, take the distance between clusters to be the minimum distance between pairs of elements, one from each cluster.

(b) Then, construct from the original matrix of Fig. 9.8 a new matrix whose rows correspond to users, as before, and whose columns correspond to clusters. Compute the entry for a user and cluster of items by averaging the nonblank entries for that user and all the items in the cluster.

(c) Compute the cosine distance between each pair of users, according to your matrix from Part (b).

Reference no: EM131221461

Questions Cloud

Sales representative at the local fitness center health : You are a sales representative at the local fitness center health & fitness gym. Your manager expects each representative to track weekly new membership data so you create a spreadsheet to store data.
Discuss the pros and cons of option-prioritize your thoughts : Merit Enterprise Corp. Sara Lehn, chief financial officer of Merit Enterprise Corp., was reviewing her presentation one last time before her upcoming meeting with the board of directors. Discuss the pros and cons of option 1, and prioritize your thou..
Brief comparison of vpn protocols : Provide a brief comparison of VPN Protocols, outlining the advantages and disadvantages of each. Provide a scenario where it might be useful to use VPN for an organization.
How has the cost changed over the past few years : how has the cost changed over the past few years, and how is it likely to change. Use sources you find on the internet, including review articles and scientific publications.
Compute the cosine distance between each pair of users : Then, construct from the original matrix of Fig. 9.8 a new matrix whose rows correspond to users, as before, and whose columns correspond to clusters. Compute the entry for a user and cluster of items by averaging the nonblank entries for that use..
Which points need further clarification and why : In this section, you will analyze your findings from the articles and answer these questions: With which points did you agree and/or disagree and why? Which points resonated with you and why? Which points need further clarification and why? How do..
Analyze the database security highlights : Thoroughly analyze the database security highlights offered by COTS (business off the rack) DBMS's. For every component you ought to quickly layout the database security issue the element is tending to.
Computers and the future : What do you think the future of computer technology will be 5 to 10 years from now.  For example in the 1960's Star Trek have the flip communicator and then in the 1990's we have the motorola flip cell phone.
What would be the angles between the vectors : One fair way of selecting scale factors is to make each inversely proportional to the average value in its component. What would be the values of α and β, and what would be the angles between the vectors?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining why the process needs to be undertaken

Explaining why the process needs to be undertaken. Providing details regarding the information gathering process. How your employees themselves should be involved in the process, both during and AFTER the information is gathered.

  Explain the use of containers in ssis

Explain the use of containers in SSIS and also their types.

  Compare three tools and apply your findings

Be sure to include comparative detail information on implementation scenarios, target industries, company types most suited for the tool, costs, software type, the type of operating system required, and the target user population.

  Create a procedure that receives an integer value

Create a procedure that receives an integer value between 0 and 100, and display a single capital letter on the screen. The letter returned by the procedure should be according to the following ranges.

  State clearly any additional assumptions you make

State clearly any additional assumptions you make. Under what conditions would the relationship HAS_PHONE be redundant in this example?

  Input the stated items into an excel spreadsheet

Create a pie chart to show the distribution of costs for the items you purchased.

  Describe and rate three other web-based resources

You are an IT support person who needs to have a good set of tools for making operating system decisions rather quickly. In this hypothetical, pick the desktop operating system you are charged with supporting (Windows XP, WIndows NT, Windows 2000,..

  What is the protocol overhead

a) What is the protocol overhead (stated as a percentage)? b) Perform the same calculation, this time assuming that both clients are using IPv6.

  What is the private key of this user

What is the private key of this user?

  Which can be used to parse command-line options

The tee command reads its standard input until end-of-file, writing a copy of the input to standard output and to the file named in its command-line argument.

  What is uml

What is UML? What does a + or - signify

  Define memory and describe types of its

Define memory. Describe types of memory, including implicit and explicit memory and declarative and procedural memory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd