Calculate the joint probability, Database Management System

Assignment Help:

Consider the following frequency counts of some itemsets in a transaction database r:

freq({A}, r) = 0.405

freq({B}, r) = 0.510

freq({C}, r) = 0.303

freq({A,B}, r) = 0.380

freq({A,C}, r) = 0.256

freq({B,C}, r) = 0.197

freq({A,B,C}, r) = 0.095

Based on this information, you can use them to compute the following probabilities. (e.g. P(X) = freq(X, r).)

a)  What is the joint probability P(A and B)? What is P(A) ? P(B)?

b) What are the confidence and lift ratio of the association rules generated from the following itemsets: {A, B, C} and { ¯A, B}?

c) Compare the results of a) and b) with the frequencies freq({A}, r) and freq({B}, r). What observations can you made about the relationship of A and B in terms of independence and possible causal relationship? Please explain your answer.


Related Discussions:- Calculate the joint probability

Boyce-codd normal form (bcnf), Boyce-Codd Normal Form (BCNF) The relati...

Boyce-Codd Normal Form (BCNF) The relation NEWSTUDENT (Enrolmentno, Sno, Sname, Cname, Cno,) has every attributes participating in candidate keys as all the attributes are assu

What is the use of keyword isa, What is the use of keyword ISA? The use...

What is the use of keyword ISA? The use of keyword ISA is to show that a class is a specialization of another class.

Describe disk manager and their work, Describe disk manager and their work?...

Describe disk manager and their work? Disk Manager: Responsible for fetching data regulated through file Manager from disk storage within Main memory and deciding what data to

What is hash file organization, What is hash file organization? What are t...

What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow?

Functional dependency, Functional Dependency Consider a relation R that...

Functional Dependency Consider a relation R that has 2 attributes A and B. The attribute B of the relation is functionally dependent on the attribute A if and only if for every

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Two phase locking (2pl), Two Phase Locking (2PL) The two-phase locking ...

Two Phase Locking (2PL) The two-phase locking protocol having of two phases: Phase 1 : The lock acquisition phase : If a transaction T needs to read an object, it wants to

Database incident table, The Incident table, with an auto-incrementing in...

The Incident table, with an auto-incrementing incident number, etc, looks like: incident_num reporter date time incide

Determine the minimal set of functional dependencies, Determine the minimal...

Determine the minimal set of functional dependencies for the following data. This table is part of the OHSU database of extracurricular activities and tracks the DMICE band's co

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd