What is the degree of membership to the fuzzy set

Assignment Help Computer Engineering
Reference no: EM13885588

Problem 1: K-means clustering

For this question you need to refer to the k-means clustering algorithm in the Course Slides posted on Blackboard.

Point

x

y

1

1.0

1.0

2

1.5

2.0

3

3.0

4.0

4

5.0

7.0

5

3.5

5.0

6

4.5

5.0

7

3.5

4.5

Assume we have the above dataset that shows 7 points in a 2-dimensional space, with x coordinates shown in the x column, and y coordinates shown in the y column. Assuming the number of clusters is set to 2 (i.e., k=2), and distances among points are measured by Euclidean

distance. Based on observation, a good choice of the initial centroids (cluster centers) are point 1 (1.0, 1.0) and point 4 (5.0, 7.0) (these two points are relatively further away from each other). Your job is to run the k-means algorithm and answer the following questions.

(i) After the initial centroids are assigned (shown above), the first step in a clustering process is to check the rest of the points and assign them to one of the two clusters. Here we assume that the centroid remain unchanged during the first round (iteration). Determine cluster memberships (which points belong to Cluster 1 and which belong to Cluster 2) for each of these 7 points after the first iteration. Show intermediate results how you obtain the solution.

(ii) Based on the results obtained from step (i), recalculate centroids (the mean vectors) for the two clusters. Then recalculate the distance from each point to its centroid. Show your results. Are there any points need to change their cluster memberships? If so, what are these points?

(iii) Continue the process shown in step (ii) for another iteration. Do you observe any changes in cluster memberships? If so, what are these points? If not, will there be further changes if we continue the process with more iterations?

Notes:

• It would be easier to solve the problem if you can draw a picture and show changes of centroids on a 2-dimensional system.
• Since this is a tiny dataset, the entire process can be computed by hand.

Problem 2: Logic

For this question you need to refer to the discussion on logic in the Course Slides (Module 4-1) posted on Blackboard.

(i) Look at the following sentences written in first-order logic. Explain these sentences in plain English. Based on the definitions on validity and satisfiability, are these statements valid? If not, are they satisfiable? [20 points]

∀x ∃y Loves(x, y) ⇔∃x ∀y Loves(x, y)
∀x Loves(x, movie) ⇔ ¬∃x ¬Loves(x, movie)
∃x Loves(x, movie) ⇔ ¬∀x ¬Loves(x, movie)
¬∀x ¬ Loves(x, movie) ⇔ ∀x Loves(x, movie)

(ii) Based on our discussion on refutation resolution, given the following premises:

Father(A, B) Alive(A)

∀x∀y Father(x, y) ⇒ Parent(x, y)

∀x∀y (Parent(x, y) ∧ Alive(x)) ⇒ Older(x, y) Prove the following: Older(A, B)

Note: this simple question can also be proved by forward/backward reasoning. However you are required to use refutation resolution. [20 points]

Problem 3: Fuzzy Logic

The following fuzzy function was used to calculate membership values for the set healthy. A membership value of 1 is healthy; a membership value of 0 is not healthy; a membership value between 0 and 1 is the degree of membership in the healthy set.

1975_Fuzzy Logic.png

BMI values that range from 20 to 25 are members of the healthy set (1). BMI values greater than 27 or less than 18 are not members of the healthy set (0). BMI values close to the healthy range (20 to 25) are a value between 0 and 1. For example, a BMI of 19.6 is 0.8 degree of membership in the healthy set.

(i) Draw the graphic for the healthy set, representing the values, healthy and unhealthy.

(ii) What is the degree of membership to the fuzzy set healthy of person B who has a BMI of 26.2? And to the fuzzy set unhealthy?

(iii) In this example, is it possible that the total degree of membership (summation of degrees of membership in different sets) exceeds 1? Why or why not?

Reference no: EM13885588

Questions Cloud

What is the dependent variable in the study : How many subjects will be in the experimental and control groups and What is the dependent variable in the study? How will it be measured? How many times will it be measured?
Property transactions and tax avoidance : Property Transactions and Tax Avoidance
What challenges faced in training expatriate managers : What are some of the challenges faced in training expatriate managers? As an HR manager what can you do to overcome those challenges? Be thorough in your analysis
Draw the budget constraint for the individual : An individual has an income of $1000 per month with which they buy the composite good with a price of $1 and food with a price of $2/unit of food. Draw the budget constraint for the individual with the composite good on the y-axis and food on the x-a..
What is the degree of membership to the fuzzy set : Draw the graphic for the healthy set, representing the values, healthy and unhealthy and what is the degree of membership to the fuzzy set healthy of person B who has a BMI of 26.2? And to the fuzzy set unhealthy?
Most toxic substances known : Consider the following information: i. The layer of dead skin on our bodies is sufficient to protect us from most -particle radiation. ii. Plutonium is an -particle producer. iii. The chemistry of Pu4 is similar to that of Fe3. iv. Pu oxidizes..
Estimate the total value of illinois tool works common share : With these relatively simple assumptions, use the abnormal earnings model to estimate the total value of Illinois Tool Works' common shares as of the end of Year 3.
Federal reserve buys some government bonds : Equilibrium exists where the price level is 1.25 and the money supply equals 21 billion. What is a new possible equilibrium when the Federal Reserve buys some government bonds?
Economic issues and traditional values on social issues : Which of the following ideologies emphasizes liberty on economic issues and traditional values on social issues?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Fundamental to network management is the capability to

fundamental to network management is the ability to gather information about the status and behavior of the networked

  Risks of using wireless technologies in your department

A justification for the decision, and the risks of using wireless technologies in your department and A spreadsheet to track hardware or software requirements of your proposed wireless technologies, including the associated costs

  Define a prefix of a string is a substring string

An exact match will override a prefix match. For instance, the prefix "car" matches the given word "car" exactly. Therefore, it is understood without ambiguity that "car" is an abbreviation for "car", not for "carriage" or any of the other words i..

  Benefits of ansi/tia/eia cabling standards

Discuss about the benefits of the ANSI/TIA/EIA cabling standards in detail and also explain why telecommunications managers must be familiar with them.

  Develop a marie program that will input a variable number

Develop a MARIE program that will input a variable number of user entered Decimal whole number grades, validating each one (0-100) in a subroutine. If the input is invalid just terminate the input loop.

  Create the boolean algebra expression for the output

Create a truth table for your circuit that lists the following: X1, X2, S, D, Q, and Not Q. X1 and X2 are input signals to the multiplexer, and S is the multiplexer selector signal.

  Describe the kinds of questions mcgraw-hill might have

analysisdescribe the kinds of questions mcgraw-hill might have asked as part of determining the feasibility of the

  Write a program to converts temperatures between

write a program to converts temperatures between fahrenheit and celsius. your program should print a brief message

  Design an exception class

I need to write downan applet file that prompts the user for an ID number and an age. Create an Exception class and throw an Exception of that class if ID is not in the range of valid ID numbers (zero through 899), or if the age is not in the rang..

  Software driver that will implement a byte-wide data

Design the hardware and software driver that will implement a byte-wide data transfer from your processor to a peripheral device. Each transfer must be accompanied by a strobe to deskew the data. Draw the UML sequence diagram and the timing diagra..

  Handling the asset and threat

Propose the reasonable values for the items in risk register for this asset and threat, and offer justifications for your choices.

  The hard drive will the original query take

suppose (somewhat artificially) that RAM can hold 200 rows and devotes half of that to reading one table and half to reading the other table and has "other places" to store the subquery/query results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd