Mining association rules with weka

Assignment Help Basic Computer Science
Reference no: EM131074858

Mining Association Rules with Weka

In Module 3, you installed Weka and used Weka to classify some data. This Critical Thinking assignment will require you to use Weka to mine association rules.  We will do this using the apriori algorithm.  Your assignment is to open the data file "vote.arff" and generate the top 10 rules.

Here is a step by step guide to load this file and run generate the rules.

  1. Save the "vote.arff" to someplace on your computer that you can quickly find it. This could be a folder in documents or on your desktop.
  2. Open Weka and go to the Explorer. 
  3. Click "Open File" select the vote.arff from wherever you saved it.
  4. Click the associate tab. You'll notice that the default algorithm used is apriori.  You can click on the values and change them if need be based on the project you are working on.  For our purposes today, you can leave the default values where they are.
  5. Click OK
  6. Click Start

Your report will include a combination of screenshots and written work. In your report, please include:

  1. A screenshot of Weka Explore when the file "vote.arff" is successfully loaded;
  2. A screenshot of Weka Explore when the classification is complete;
  3. After generating the top 10 mining rules using the Apriori algorithm, explain each of the top 10 rules.
  4. Your answer to the following question: What does the confidence of each rule represent? (100 words)

Reference no: EM131074858

Questions Cloud

Network management guide : Throughout this course, you will be working on several aspects of networking that will result in a complete Network Management Guide document for a scenario organization of your choosing. You will work extensively with the concepts of good network..
What happens when x'' (1) and y'' (0) are both the zero vector : What happens when x' (1) and y' (0) are both the zero vector?
Approach the marketing strategy for particular product : Choose a specific product that you use on a daily basis (such as food items, toiletries, or your car). Who are you (demographics, psychographics, etc.)? What do you do with the product (consumption, storage, disposal, etc.)? Where do you purchase the..
Computer with three hard disks : You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. R RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?
Mining association rules with weka : In Module 3, you installed Weka and used Weka to classify some data. This Critical Thinking assignment will require you to use Weka to mine association rules.  We will do this using the apriori algorithm.  Your assignment is to open the data file ..
Construct a line segment that points in the direction : Compute the tangent vector x' (t). Determine how x' (0) and x' (1) are related to the control points, and give geometric descriptions of the directions of these tangent vectors. Is it possible to have x' (1) = 0?
Goals and mission of the information security community : The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
Write an instruction for feeding an infant : write an instruction for feeding an infant. If you have some personal experience in this area, you may use this experience as a source of information. However, you should also conduct some research to obtain some expert opinions and to be certain ..
What is natural monopoly : What is a “natural monopoly”? Why is it the case that the market system cannot deliver a sustainable competitive equilibrium in the case of a “natural monopoly”. What, in your view is likely to be the most attractive option for how the government sho..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  As you educate the security staff on cryptographic concepts

As you educate the security staff on cryptographic concepts, you also will soon make recommendations on the tools that will be appropriate for this company. You will address the topic of digital signatures with the staff. Present the concepts of digi..

  Analyze the key roles the agile coach plays

Evaluate the importance of being an agile coach on the project team. Analyze the key roles the agile coach plays in team communication and facilitation activities

  Evaluate online tutorials and online communities

Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be the most effective and explain why.

  Important principles of is development

In your opinion what are the 3 most important principles of IS development; briefly discuss them and why do you think they are the most important?

  What is the objective of compensation in the workplace

1. Define the terms Performance Management, Performance Evaluation, and Performance Feedback and explain how each of the three tools is used in the workplace.  2. What is the objective of compensation in the workplace and what are two factors affecti..

  What is the system log used for

What is the system log used for?

  Explain the difference between frequency division multiplex

Explain the difference between frequency division multiplexing

  Designing a 24 cpu multiprocessor chip

designing a 24 CPU multiprocessor chip to compete with Intel PHI at a lower price point. Each core will run at 2 GHz and have a 32Kb L1 cache, 50ps access (per word), 8 word blocks, 4-way associative, write-through, 1% miss ratio There is a 6Mb L2 ca..

  Developing a graphical user interface in programming

Developing a graphical user interface in programming is paramount to being successful in the business industry. This project incorporates GUI techniques with other tools that you have learned about in this class.

  Average joes competing to make an impact

Directions: You are a brand new coffee chain, Average Joes competing to make an impact on the coffee industry through an application similar to Starbucks.com. You are required to provide a design of the program that includes: a pseudocode, and a comp..

  Influence or change users relationship with information

How does the technology of information feed influence or change users' relationship with information?

  Utilizing supporting documentation obtained

Please provide a one page response to the following topic utilizing supporting documentation obtained from your textbooks and the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd