Compute the cosines of the angles between the vectors

Assignment Help Basic Computer Science
Reference no: EM131221473

A certain user has rated the three computers of Exercise 9.2.1 as follows: A: 4 stars, B: 2 stars, C: 5 stars.

(a) Normalize the ratings for this user.

(b) Compute a user profile for the user, with components for processor speed, disk size, and main memory size, based on the data of Exercise 9.2.1.

Exercise 9.2.1

Three computers, A, B, and C, have the numerical features listed below:

1657_25850d44-0fbe-44fd-b2a8-5d41596c1676.png

We may imagine these values as defining a vector for each computer; for instance, A's vector is [3.06, 500, 6]. We can compute the cosine distance between any two of the vectors, but if we do not scale the components, then the disk size will dominate and make differences in the other components essentially invisible. Let us use 1 as the scale factor for processor speed, α for the disk size, and β for the main memory size.

(a) In terms of α and β, compute the cosines of the angles between the vectors for each pair of the three computers.

(b) What are the angles between the vectors if α = β = 1?

(c) What are the angles between the vectors if α = 0.01 and β = 0.5?

(d) One fair way of selecting scale factors is to make each inversely proportional to the average value in its component. What would be the values of α and β, and what would be the angles between the vectors?

Reference no: EM131221473

Questions Cloud

What value minimizes the rmse for the matrix m : If we wish to start out, as in Fig. 9.10, with all U and V entries set to the same value, what value minimizes the RMSE for the matrix M of our running example?
Disaster recovery plans in case of earthquakes : "Disaster recovery plans in case of earthquakes, fires, hurricanes, asteroids that collide with satellites, or other natural or man-made disasters." Many companies have a "risk action plan" to handle unexpected events including network security ev..
Understanding of multimedia fundamentals : Demonstrate a working knowledge of basic 2D computer arts creation and modification tools, techniques and strategies - Demonstrate a working knowledge of basic 3D modeling skills, photorealistic enhancement.
Describe the financial markets in terms of types : Describe the financial markets in terms of types (primary vs. secondary with IPO and seasoned), Timing (money and capital), Brick and mortar. Be able to list and describe money market instruments such as commercial paper and bankers' acceptances as w..
Compute the cosines of the angles between the vectors : In terms of α and β, compute the cosines of the angles between the vectors for each pair of the three computers.
Straight line method of amortization of any bond premium : On April 1, 2016 Alpha Company sells $1,000,000 face value of 10% five year bonds which call for semiannual interest payments. The bonds are dated April 1, 2016 so these bonds are issued on an interest date. The market rate at the date of issue is 8%..
Discuss the technology impact on social : Discuss the technology's impact on social, ethical, and legal issues. How do you think the role of this technology has changed HCI since its inception? How do you see the future of this technology further changing HCI?
Customer for accounting services : On February 1, 2016, the company loaned $100,000 to a supplier and received a 5-year, 12% note. The first annual interest payment is due January 31, 2017. On November 15, 2016, the company received $50,000 from a customer for accounting services to b..
Power-energy quantification : A server farm has most of its servers operating at only 50% capacity. The problem is that the power draw from these servers does not scale linearly with the reduced load; that is, when the servers are operating at 50% capacity

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are some of most important technological innovations

What are some of the most important technological innovations of the past year?

  What is the average memory access time t_{m}

what is the average memory access time T_{m} ?

  Justify why the company should implement your recommendation

Metrics: Which metrics should the company track using the tool and strategy you have chosen? Why? Explain what each metric represents and why it is important.

  Have you ever copied things from one document to another

Have you ever copied things from one document to another or from Word to PowerPoint, or any variation like that? Do you find it useful

  Number of multiplications used by the fast exponentiation

Give a precise count on the number of multiplications used by the fast exponentiation routine. (Hint: Consider the binary representation of N.)

  What will be its approximate speed in rpm

An AC inductor motor is rated at 1750 rpm with a line frequency of 60hz. If the motor is operated on a 50 hz line, what will be its approximate speed in rpm.

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  Write a function named "subtotal" takes as its arguments

The function should replace the contents of each cell with the sum of the contents of all the cells in the original array from the left end to the cell in question. Thus, for example, if the array passed to the function looks like this:

  Recompute the cost of sorting the relation

Recompute the cost of sorting the relation

  Ethical decision model to analyse the situation

A Essay Part 2 (of 2): Analysing an Ethical Dilemma Due Date: Midnight of Friday 17 October 2014, Weight: 50% (50 marks) Description: Part 2 is a new piece of work that should not include material from Part 1. As before, it is a written analysis (..

  Create a method to make each object in the first list

Create a method to make each object in the first list say hello to each object in the second list, and vice versa.

  Arp request packet the host sends

A host with an IPv4 address 130.23.43.20 and MAC address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25. Show the entries in the ARP request packet the host sends.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd