English 103 Final Test
Reading Poetry for 10%
Answer all five the questions below. For simplicity, you may type your work directly onto this document. Limit each of your answers (e.g. 1a etc.) to approximately four or five sentences.
Before you begin, a note on citing poetry references in MLA style. Direct quotations should be followed by a parenthetical citation that displays the relevant line number(s): for example, “moonless night rim world” (Lowther 2). Short quotations of three lines or less should be enmeshed in your prose and line breaks should be recorded with a slash: for example, “moonless night rim world, / A long-dead city” (Lowther 2-3). No need to provide a list of works cited for the poems at the end of your test paper, if you are using the digital reading package for this course. However, if you consult any secondary sources you must fully reference each and every one.
1. “Vancity’ (2 marks)
a. What is the speaker’s situation? Integrate some quoted evidence in your answer.
b. How does Lowther use metaphor skilfully in this poem?
2. “take a st. and” (2 marks)
a. Why is the speaker in this poem care what’s happening to the water under a street corner in Vancouver?
b. How does the poet arrange text on the page to reflect a central theme in the poem?
3. “What Jack Shadbolt said” (2 marks)
a. Why are Jack Shadbolt’s words important to the speaker in this poem?
b. How does the poet (Carolan) organize the stanzas and line breaks to guide the reader through the poem?
4. “happy birthday dear house” (2 marks)
a. Which sounds and images in this poem most vividly evoke the speaker’s childhood?
b. How do you interpret the lines, “in the land/of the second chance” (lines 20-21)?
5. “Quayside” (2 marks)
a. Identify a central theme in this poem and comment on how the poet (Lau) explores it. Include a few short direct quotes in your answer.
b. Why are the lines “—and then I saw that for years/you have existed all around me” (12-13) especially significant in this poem?
\ ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y \ t.\ $t,/,1'
n,5 \ . 7 \ V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
If you purchased this book within the United States or Canada you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall Software
Ma ...
( (P A N G . N I N G T A NM i c h i g a n VannaJoy20
\ ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y \ t.\ $t,/,1'
n,5 \ . 7 \ V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
If you purchased this book within the United States or Canada you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall Software
Marketing Manager Michelle Brown
Copyeditor Kathy Smith
Proofreader IenniferMcClain
Technicallllustration GeorgeNichols
Cover Design Supervisor Joyce Cosentino Wells
Cover Design Night & Day Design
Cover Image @ 2005 Rob Casey/Brand X pictures
hepress and Manufacturing Caroline Fell
Printer HamiltonPrinting
Access the latest information about Addison-Wesley titles from our iWorld Wide Web site:
http : //www. aw-bc.com/computing
Many of the designations used by manufacturers and sellers to distiriguish their products
are claimed as trademarks. where those designations appear in this book, and Addison-
Wesley was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
The programs and applications presented in this book have been incl,[rded for their
instructional value. They have been tested with care, but are not guatanteed for any
particular purpose. The publisher does not offer any warranties or representations, nor does
it accept any liabilities with respect to the programs or applications.
Copyright @ 2006 by Pearson Education, Inc.
For information on obtaining permission for use of material in this work, please submit a
written request to Pearson Education, Inc., Rights and Contract Department, 75 Arlington
Street, Suite 300, Boston, MA02II6 or fax your request to (617) g4g-j047.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or any other media embodiments now known or hereafter to become known,
without the prior written permission of the publisher. printed in the united States of
America.
lsBN 0-321-42052-7
2 3 4 5 67 8 9 10-HAM-O8 07 06
our famili,es
Preface
Advances in data generation and collection are producing data sets of mas-
sive size in commerce and a variety of scientific disciplines. Data warehouses
store details of the sales and operations of businesses, Earth-orbiting satellites
beam high-resolution ima ...
\ ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y \ t.\ $t,/,1'
n,5 \ . 7 \ V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
If you purchased this book within the United States or Canada you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall Software
Marketing Manager Michelle Brown
Copyeditor Kathy Smith
Proofreader IenniferMcClain
Technicallllustration GeorgeNichols
Cover Design Supervisor Joyce Cosentino Wells
Cover Design Night & Day Design
Cover Image @ 2005 Rob Casey/Brand X pictures
hepress and Manufacturing Caroline Fell
Printer HamiltonPrinting
Access the latest information about Addison-Wesley titles from our iWorld Wide Web site:
http : //www. aw-bc.com/computing
Many of the designations used by manufacturers and sellers to distiriguish their products
are claimed as trademarks. where those designations appear in this book, and Addison-
Wesley was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
The programs and applications presented in this book have been incl,[rded for their
instructional value. They have been tested with care, but are not guatanteed for any
particular purpose. The publisher does not offer any warranties or representations, nor does
it accept any liabilities with respect to the programs or applications.
Copyright @ 2006 by Pearson Education, Inc.
For information on obtaining permission for use of material in this work, please submit a
written request to Pearson Education, Inc., Rights and Contract Department, 75 Arlington
Street, Suite 300, Boston, MA02II6 or fax your request to (617) g4g-j047.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or any other media embodiments now known or hereafter to become known,
without the prior written permission of the publisher. printed in the united States of
America.
lsBN 0-321-42052-7
2 3 4 5 67 8 9 10-HAM-O8 07 06
our famili,es
Preface
Advances in data generation and collection are producing data sets of mas-
sive size in commerce and a variety of scientific disciplines. Data warehouses
store details of the sales and operations of businesses, Earth-orbiting satellites
beam high-resolution ima.
CJUS 745
Quantitative Analysis Report: Multiple Regression Analysis Assignment Instructions
Overview
You will take part in several data analysis assignments in which you will develop a report using tables and figures from the IBM SPSS® output file of your results. Using the resources and readings provided, you will interpret these results and test the hypotheses and writeup these interpretations.
Instructions
· Copy and paste all tables and figures into a Word document and format the results in APA current edition.
· Interpret your results.
· Final report should be formatted using APA current edition, and in a Word document.
· 4-5 double-spaced pages of content in length (not counting the title page or references).
This assignment uses the Productivity. sav dataset. Address the following research question using a multiple regression (MR) model. Provide all assumptions for the MR test:
RQ 8: Is there a significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk)?
· H08: There is no statistically significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk).
· Ha8: There is a statistically significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk).
There are several assumptions for a multiple regression that must be met:
1. First, the dependent variable must be normally distributed. If not, it must be converted to z scores (see page 32-33 in Cronk).
2. To test for normal distribution, run the Shapiro-Wilk test (See Testing Normality of Dataset.pdf).
3. When you run the Multiple Regression, ensure you select options for multicollinearity and residual plots (see Cronk).
· See Multiple Regression Primer for SPSS.pdf.
· A comprehensive resource to help guide you is included with the assignment Multiple Regression Comprehensive Review.pdf.
General Instructions
As doctoral students, your assignments are expected to follow the principles of high-quality scientific standards and promote knowledge and understanding in the field of public administration. You should apply a rigorous and critical assessment of a body of theory and empirical research, articulating what is known about the phenomenon and ways to advance research about the topic under review. Research syntheses should identify significant variables, a systematic and reproducible search strategy, and a clear framework for studies included in the larger analysis.
Manuscripts should not be written in first person (“I”). All material should ...
This document provides an overview and introduction to the statistical software R. It describes how R can be obtained and installed. R is a free and open-source software environment for statistical analysis and graphics. The document outlines the basic features of the R environment, including how to work with data and packages in R. It provides a conceptual overview of the organization of the book, which uses R and biological examples to teach statistics concepts ranging from basic to advanced topics.
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...Saqib Raza
The preface honors the late co-author Philippe Flajolet and dedicates the second edition to his memory. It recounts Sedgewick's eulogy for Flajolet, praising his brilliance, creativity, generosity and the impact he had on many lives through his collaborations. The second edition aims to teach future generations and continue building upon Flajolet's mathematical legacy.
Writing Project 3 PrewritingFor this project I have chos.docxjeffevans62972
Writing Project 3 Prewriting
For this project I have chosen the issue of police brutality which is gradually crawling back specifically affecting youths and teens residing in low economic suburbs in Georgia.
My project will therefore target the residents in these localities particularly the youth, parents and opinion shapers with regards to shaping public policies. These stakeholders include activism NGOs, social researchers and the local political leadership.
This initiative was inspired by a presentation made by Isabela Robinson on Ted Talks in March last year where she suggested the evils subjected on young citizens by the police and the effect this has on their development (TEDx Talks, 2019).
Research Question- The role of social media in reporting cases of police brutality in low economic status suburbs in Savannah.
To collect primary data for my study, I have interviewed two victims of this social evil, their respective parents and have complemented this information with records of hospitalized victims and an expert opinion from a local researcher affiliated to social activism firm in Savannah.
In this project I will persuade the residents of the suburbs to embark on forming social networks and giving these cases the publicity they need to be exposed and attended.
To successfully convince the residence to use social media to root out police brutality I will use experts and opinions from authorities of the sociology of policing, present to them statistics of those affected by the issue and the worrying trend and later present the sorry states of those whose lives have been negative affected by the issue.
However, disrespect for authorities in many instances prompt the police to apply violence (Silver, 2017). I will emphasize on cooperation with the police and a call for the youth to desist from violence and drug abuse as the police have cited these as their resolve to apply violence to apprehend some youths.
To seek more information on this project, I have used the PsycINFO catalogue in the Cleveland State Community College to identify scholarly articles relating to the issue. Here is have found articles and videos which are more important as they have more elaborate data. I have not had any trouble sourcing information on the project.
References
Silver, A. (2017). The demand for order in civil society: A review of some themes in the history of urban crime, police, and riot. In Theories and origins of the modern police (pp. 23-46). Routledge. Retrieved from; https://www.taylorfrancis.com/books/e/9781315084824/chapters/10.4324/9781315084824-3
TEDx Talks. (2019, March 7). Social Media’s Impact on Cases of Police Brutality. Retrieved from; https://www.youtube.com/watch?v=Z_Y3_y_hzp8
English 2367 Detailed Outline Assignment:
A Detailed Outline for the Persuasive Research Essay
For this assignment, you are asked to start thinking about The Persuasive Research Essay you must write. To complete this assignment, please .
Youth and Gang Violence Free Essay Example. ≫ Representation of Gang Violence in Series "On My Block" Free Essay .... Solution gang violence essay. 0747405 Gang Violence. How Can Gang Violence Be Prevented? (English) Paperback Book Free ....
This chapter introduces the concept of data and discusses some examples to illustrate key ideas:
1) The same data can be summarized in different ways (e.g. mean vs median) leading to different conclusions.
2) Self-selected samples from online polls cannot be used to make statistical inferences about a population.
3) Randomized experiments are needed to establish cause-and-effect relationships and eliminate bias, but industry-funded research may still be biased in its methods or presentation.
( (P A N G . N I N G T A NM i c h i g a n VannaJoy20
\ ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y \ t.\ $t,/,1'
n,5 \ . 7 \ V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
If you purchased this book within the United States or Canada you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall Software
Marketing Manager Michelle Brown
Copyeditor Kathy Smith
Proofreader IenniferMcClain
Technicallllustration GeorgeNichols
Cover Design Supervisor Joyce Cosentino Wells
Cover Design Night & Day Design
Cover Image @ 2005 Rob Casey/Brand X pictures
hepress and Manufacturing Caroline Fell
Printer HamiltonPrinting
Access the latest information about Addison-Wesley titles from our iWorld Wide Web site:
http : //www. aw-bc.com/computing
Many of the designations used by manufacturers and sellers to distiriguish their products
are claimed as trademarks. where those designations appear in this book, and Addison-
Wesley was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
The programs and applications presented in this book have been incl,[rded for their
instructional value. They have been tested with care, but are not guatanteed for any
particular purpose. The publisher does not offer any warranties or representations, nor does
it accept any liabilities with respect to the programs or applications.
Copyright @ 2006 by Pearson Education, Inc.
For information on obtaining permission for use of material in this work, please submit a
written request to Pearson Education, Inc., Rights and Contract Department, 75 Arlington
Street, Suite 300, Boston, MA02II6 or fax your request to (617) g4g-j047.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or any other media embodiments now known or hereafter to become known,
without the prior written permission of the publisher. printed in the united States of
America.
lsBN 0-321-42052-7
2 3 4 5 67 8 9 10-HAM-O8 07 06
our famili,es
Preface
Advances in data generation and collection are producing data sets of mas-
sive size in commerce and a variety of scientific disciplines. Data warehouses
store details of the sales and operations of businesses, Earth-orbiting satellites
beam high-resolution ima ...
\ ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y \ t.\ $t,/,1'
n,5 \ . 7 \ V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
If you purchased this book within the United States or Canada you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall Software
Marketing Manager Michelle Brown
Copyeditor Kathy Smith
Proofreader IenniferMcClain
Technicallllustration GeorgeNichols
Cover Design Supervisor Joyce Cosentino Wells
Cover Design Night & Day Design
Cover Image @ 2005 Rob Casey/Brand X pictures
hepress and Manufacturing Caroline Fell
Printer HamiltonPrinting
Access the latest information about Addison-Wesley titles from our iWorld Wide Web site:
http : //www. aw-bc.com/computing
Many of the designations used by manufacturers and sellers to distiriguish their products
are claimed as trademarks. where those designations appear in this book, and Addison-
Wesley was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
The programs and applications presented in this book have been incl,[rded for their
instructional value. They have been tested with care, but are not guatanteed for any
particular purpose. The publisher does not offer any warranties or representations, nor does
it accept any liabilities with respect to the programs or applications.
Copyright @ 2006 by Pearson Education, Inc.
For information on obtaining permission for use of material in this work, please submit a
written request to Pearson Education, Inc., Rights and Contract Department, 75 Arlington
Street, Suite 300, Boston, MA02II6 or fax your request to (617) g4g-j047.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, or any other media embodiments now known or hereafter to become known,
without the prior written permission of the publisher. printed in the united States of
America.
lsBN 0-321-42052-7
2 3 4 5 67 8 9 10-HAM-O8 07 06
our famili,es
Preface
Advances in data generation and collection are producing data sets of mas-
sive size in commerce and a variety of scientific disciplines. Data warehouses
store details of the sales and operations of businesses, Earth-orbiting satellites
beam high-resolution ima.
CJUS 745
Quantitative Analysis Report: Multiple Regression Analysis Assignment Instructions
Overview
You will take part in several data analysis assignments in which you will develop a report using tables and figures from the IBM SPSS® output file of your results. Using the resources and readings provided, you will interpret these results and test the hypotheses and writeup these interpretations.
Instructions
· Copy and paste all tables and figures into a Word document and format the results in APA current edition.
· Interpret your results.
· Final report should be formatted using APA current edition, and in a Word document.
· 4-5 double-spaced pages of content in length (not counting the title page or references).
This assignment uses the Productivity. sav dataset. Address the following research question using a multiple regression (MR) model. Provide all assumptions for the MR test:
RQ 8: Is there a significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk)?
· H08: There is no statistically significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk).
· Ha8: There is a statistically significant predictive relationship of employee productivity (productivity) from levels of Teamwork (teamwork), Technical Knowledge (jobknowl), Adequate Authority to do job well (jobauthr), Fair Treatment (wkrtrtmt), and Sick Days (wrkdyssk).
There are several assumptions for a multiple regression that must be met:
1. First, the dependent variable must be normally distributed. If not, it must be converted to z scores (see page 32-33 in Cronk).
2. To test for normal distribution, run the Shapiro-Wilk test (See Testing Normality of Dataset.pdf).
3. When you run the Multiple Regression, ensure you select options for multicollinearity and residual plots (see Cronk).
· See Multiple Regression Primer for SPSS.pdf.
· A comprehensive resource to help guide you is included with the assignment Multiple Regression Comprehensive Review.pdf.
General Instructions
As doctoral students, your assignments are expected to follow the principles of high-quality scientific standards and promote knowledge and understanding in the field of public administration. You should apply a rigorous and critical assessment of a body of theory and empirical research, articulating what is known about the phenomenon and ways to advance research about the topic under review. Research syntheses should identify significant variables, a systematic and reproducible search strategy, and a clear framework for studies included in the larger analysis.
Manuscripts should not be written in first person (“I”). All material should ...
This document provides an overview and introduction to the statistical software R. It describes how R can be obtained and installed. R is a free and open-source software environment for statistical analysis and graphics. The document outlines the basic features of the R environment, including how to work with data and packages in R. It provides a conceptual overview of the organization of the book, which uses R and biological examples to teach statistics concepts ranging from basic to advanced topics.
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...Saqib Raza
The preface honors the late co-author Philippe Flajolet and dedicates the second edition to his memory. It recounts Sedgewick's eulogy for Flajolet, praising his brilliance, creativity, generosity and the impact he had on many lives through his collaborations. The second edition aims to teach future generations and continue building upon Flajolet's mathematical legacy.
Writing Project 3 PrewritingFor this project I have chos.docxjeffevans62972
Writing Project 3 Prewriting
For this project I have chosen the issue of police brutality which is gradually crawling back specifically affecting youths and teens residing in low economic suburbs in Georgia.
My project will therefore target the residents in these localities particularly the youth, parents and opinion shapers with regards to shaping public policies. These stakeholders include activism NGOs, social researchers and the local political leadership.
This initiative was inspired by a presentation made by Isabela Robinson on Ted Talks in March last year where she suggested the evils subjected on young citizens by the police and the effect this has on their development (TEDx Talks, 2019).
Research Question- The role of social media in reporting cases of police brutality in low economic status suburbs in Savannah.
To collect primary data for my study, I have interviewed two victims of this social evil, their respective parents and have complemented this information with records of hospitalized victims and an expert opinion from a local researcher affiliated to social activism firm in Savannah.
In this project I will persuade the residents of the suburbs to embark on forming social networks and giving these cases the publicity they need to be exposed and attended.
To successfully convince the residence to use social media to root out police brutality I will use experts and opinions from authorities of the sociology of policing, present to them statistics of those affected by the issue and the worrying trend and later present the sorry states of those whose lives have been negative affected by the issue.
However, disrespect for authorities in many instances prompt the police to apply violence (Silver, 2017). I will emphasize on cooperation with the police and a call for the youth to desist from violence and drug abuse as the police have cited these as their resolve to apply violence to apprehend some youths.
To seek more information on this project, I have used the PsycINFO catalogue in the Cleveland State Community College to identify scholarly articles relating to the issue. Here is have found articles and videos which are more important as they have more elaborate data. I have not had any trouble sourcing information on the project.
References
Silver, A. (2017). The demand for order in civil society: A review of some themes in the history of urban crime, police, and riot. In Theories and origins of the modern police (pp. 23-46). Routledge. Retrieved from; https://www.taylorfrancis.com/books/e/9781315084824/chapters/10.4324/9781315084824-3
TEDx Talks. (2019, March 7). Social Media’s Impact on Cases of Police Brutality. Retrieved from; https://www.youtube.com/watch?v=Z_Y3_y_hzp8
English 2367 Detailed Outline Assignment:
A Detailed Outline for the Persuasive Research Essay
For this assignment, you are asked to start thinking about The Persuasive Research Essay you must write. To complete this assignment, please .
Youth and Gang Violence Free Essay Example. ≫ Representation of Gang Violence in Series "On My Block" Free Essay .... Solution gang violence essay. 0747405 Gang Violence. How Can Gang Violence Be Prevented? (English) Paperback Book Free ....
This chapter introduces the concept of data and discusses some examples to illustrate key ideas:
1) The same data can be summarized in different ways (e.g. mean vs median) leading to different conclusions.
2) Self-selected samples from online polls cannot be used to make statistical inferences about a population.
3) Randomized experiments are needed to establish cause-and-effect relationships and eliminate bias, but industry-funded research may still be biased in its methods or presentation.
The Concept of ‘Postmodernism’ Essay Example | StudyHippo.com. Postmodernism essay. Postmodernism Essay Plan | Postmodernism | Philosophical Movements. ᐅ Essays On Postmodernism
The Concept of ‘Postmodernism’ Essay Example | StudyHippo.com. Postmodernism essay. Postmodernism Essay Plan | Postmodernism | Philosophical Movements. ᐅ Essays On Postmodernism
This document provides a preface and table of contents for the book "Think Stats: Probability and Statistics for Programmers" by Allen B. Downey. The preface describes why the author wrote the book and how he wrote it, emphasizing the computational approach and use of real-world datasets. The preface also lists contributors who provided feedback. The table of contents provides an overview of the book's 7 chapters, which cover topics like descriptive statistics, probability, hypothesis testing, and more.
Running head (NAME OF THE COMPANY)’S IT PROJECT(NAME OF THE C.docxhealdkathaleen
Running head: (NAME OF THE COMPANY)’S IT PROJECT
(NAME OF THE COMPANY)’S IT PROJECT
3
(Name of the company)’s IT Project
Introduce material here… Remember, each case study must have the headings listed below and must be answered according to assignment instructions; each heading is worth a percentage of each case grade and this is how your work should be submitted. Your audience is someone like your roommate – intelligent, educated, but has NO IDEA what the case study is about. In this section, you will give a very brief overview of your company.
This section is generally one paragraph. The easiest way to explain this section is to think of it like an abstract or introduction. If written properly, this section can actually serve as the abstract for the paper. It will, in a sense, set up the rest of the paper, which is the review of the case, analysis, recommendations, and the summary and conclusions sections. Remember that you obtained this information from the textbook. Consequently, you should cite Schwalbe (2016). You should NOT write “According to the textbook” as your reader has NO IDEA who or what is that.
If there is a second paragraph, it will look like this. The paper should be written in third person narrative and not in the first person. Note: The required headings that must be in the paper are bolded and should be kept bolded. One other note: a business is an “it,” not a “they.” Remember that when you use pronouns describing a business.
Analysis of the (Your company)
In this section, you will briefly describe what you will cover. It should only take a few sentences.
History
Text will start here…
Customers
Text will start here…
Competitors
Text will start here…
Products and Services Rendered
Text will start here…
Growth
Text will start here…
Where (company) Does Business
Text will start here…
Type of Entity (corporation, sole proprietor, and so forth)
Text will start here…
How Many Employees
Text will start here…
Other Pertinent Information
Text will start here…
Type(s) of technology (the company) is Currently Using
Text will start here…
Technology Usage
Here, you will answer the question, “How the technology is being used, for what purpose?”
A Problem That Requires an IT
Solution
This is where you will answer the mandate, “The problem can be an actual problem, such as bad quality, losing customer base, etc..... or...the problem can be growth, expanding into new markets, introduction of new products and/or services, move to an online presence.”
Scope of Work to be Completed
Here, you will answer the mandate, “Identify the scope of the work, or deliverable that must be completed?”
Time Frame for the Work
Here, you will answer the mandate, “Identify a time frame for this scope of work... realistic.”
Budget for the Project
Here, you will answer the question, “Identify a budget for this project... realistic?”
Also, you must provide at least six scholarly references and cite the references in the form of in-text citations ...
PPOL 650Issue Analysis Paper InstructionsYou will submit a p.docxChantellPantoja184
PPOL 650
Issue Analysis Paper Instructions
You will submit a paper analyzing an issue related to the intersection of international law, policy, politics, and diplomacy. Upon review of the course material and topics of study, you will select a topic based on concepts studied during the course. You must identify a major international crisis, provide a factual background, collect data describing the process used to resolve the crisis, explain whether the plan used was the best course of action, and explain the outcome. You are required to compare the effectiveness of the plan in light of all the international issues, identify the specific strengths and weaknesses of the approach, and note how diplomacy was used to address the crisis. You must also include a review of alternate plans that may have been effective in resolving the issue. The paper must include a minimum of 3–5 scholarly sources (ex. books or peer reviewed articles) formatted in current Turabian style. The assignment must be 5–7 pages.
Your Issue Analysis Paper is due by 11:59 p.m. (ET) on Sunday of Module/Week 3.
Analysis on the Demand of Top Talent Introduction
in Big Data and Cloud Computing Field in China
Based on 3-F Method
Zhao Linjia, Huang Yuanxi, Wang Yinqiu, Liu Jia
National Academy of Innovation Strategy, China Association for Science and Technology, Beijing, P.R.China
Abstract—Big data and cloud computing, which can help
China to implement innovation-driven development strategy and
promote industrial transformation and upgrading, is a new and
emerging industrial field in China. Educated, productive and
healthy workforces are necessary factor to develop big data and
cloud computing industry, especially top talents are essential.
Therefore, a three-step method named 3-F has been introduced
to help describing the distribution of top talents globally and
making decision whether they are needed in China. The 3-F
method relies on calculating the brain gain index to analysis the
top talent introduction demand of a country. Firstly, Focus on the
high-frequency keywords of a specific field by retrieving the
highly cited papers. Secondly, using those keywords to Find out
the top talents of this specific field in the Web of Science. Finally,
Figure out the brain gain index to estimate whether a country
need to introduce top talents of a specific field abroad. The result
showed that the brain gain index value of China's big data and
cloud computing field was 2.61, which means China need to
introduce top talents abroad. Besides P. R. China, those top
talents mainly distributed in the United States, the United
Kingdom, Germany, Netherlands and France.
I. INTRODUCTION
Big data and cloud computing is a new and emerging
industrial field[1], and increasing widely used in China[2-4].
Talents’ experience is a source of technological mastery[5],
essentially for developing and using big data technologies.
Most European states consider the immigra.
SUBMIT ASSIGNMENT 2.1Assignment 2.1 Liberty Challenged in Ninet.docxjames891
SUBMIT ASSIGNMENT 2.1
Assignment 2.1: Liberty Challenged in Nineteenth Century America Thesis and Outline
Due Week 7 and worth 50 points
America became a free independent nation. With the signing of the Treaty of Paris in 1783, the former mother country, England, recognized that its children, the colonies, were now on their own. A constitutional republic was birthed, and thus the challenges began. Slavery, the “Peculiar Institution,” was a monumental issue facing the country. Would it die or would it survive and possibly take a nation divided with it? This sectionalism followed Americans up into the Civil War. Dissect this crisis by addressing parts I and II below.
For the next part of this assignment you will create an outline of the main points you want to address in this paper. This will serve as the basis for your Assignment 2.2 Final Draft. (Note: Please use the Purdue Owl website to assist you with this assignment; this website can be accessed at: https://owl.english.purdue.edu/engagement/2/2/55/.)
Part 1:
1. Write a thesis statement that is one to two (1-2) sentences long in which you:
a. State your thesis on the significance of this slavery issue, as exemplified in your research. Justify your response.
For the first part of this assignment you will create a thesis statement. A thesis statement is usually a single sentence somewhere in your first paragraph that presents your main idea to the reader. The body of the essay organizes the material you gather and present in support of your main idea. Keep in mind that a thesis is an interpretation of a question or subject, not the subject itself. (Note: Please consult the Purdue OWL website with tips on how to construct a proper thesis; the website can be found at: https://owl.english.purdue.edu/owl/resource/545/01/.)
Part 2:
For the next part of this assignment you will create an outline of the main points you want to address in this paper. This will serve as the basis for your Assignment 2.2 Final Draft. (Note: Please use the Purdue Owl website to assist you with this assignment; this website can be accessed at: https://owl.english.purdue.edu/engagement/2/2/55/.)2. Write a one to two (1-2) page outline in which you:
a. Describe two (2) outcomes of the 3/5ths Compromise, Missouri Compromise of 1820, Compromise of 1850, Kansas-Nebraska Act, and the Dred Scott Decision. Note: Be sure to provide two (2) outcomes for each legislation.
b. Suggest three (3) reasons why slavery was and is incompatible with our political and economic system.
c. List three to five (3-5) driving forces that led to the Civil War.
d. Use at least three (3) academic references besides or in addition to the textbook. Note: Wikipedia and other similar websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SW.
Concept and example of a semantic solution implemented with SQL views to cooperate with users on queries over structured data with independence from database schema knowledge and technology.
ESSAY ON SECTION 5 INFORMAL PROCESSES AND DISCRETION (Due 11.docxtheodorelove43763
This document provides instructions for an essay assignment on informal processes and discretion in public administration. It includes a scenario where the reader works for the Oregon Liquor Control Commission Recreational Marijuana Licensing Office, which has two scheduled video meetings - one with an 80-year-old grandmother interested in opening a dispensary, and one with a large marijuana company interested in guaranteed licensing for new retail outlets. It then provides three questions analyzing the importance of informal processes, potential inaccuracies in advice provided, and how courts review agency discretion.
Text mining and its association analysis.pdfKyusonLim
This document summarizes and analyzes the results of 6 different text mining methods - wordcloud, co-occurrence analysis, hierarchical clustering, k-medoids clustering, time series analysis using local smoothing regression, and Gaussian graphical models - that were used to analyze unstructured text data from Statistics Canada on issues in Canada during the COVID-19 pandemic in 2020. It finds that while the methods provide some varying results, the biterm topic model (BTM) method overall provides the most coherent and consistent topics by grouping keywords into 5 main clusters related to health, business, personal impacts, and economic issues.
Essay On The Road Not Taken. The Road Not Taken Analysis PDF Poetry MetaphorWendy Fricke
The road not taken by robert frost paraphrase. TEXT TO ANALYSIS ESSAY .... The Road not Taken Poem Analysis - Free Essay Example - 487 Words .... The Road Not Taken Poem by Robert Frost Motivational Poster - Etsy. School essay: Road not taken essay. The Road Not Taken Full Poem Robert Frost Literary Poster - Etsy. quot;The Road Not Takenquot; Analysis Activity for Google Drive Poetry .... An Analysis of Tone in The Road Not Taken, a Poem by Robert Frost .... English Essay The Road Not Taken PDF Poetry. The road not taken summary and theme - thingslopers. Unique The Road Not Taken Essay Thatsnotus. Essay On The Road Not Taken By Robert Frost uvadyru7by. The Road Not Taken Poetry Fiction amp; Literature. Road not taken interpretation essay examples. Critical appreciation of the poem the road not taken. Critical .... The Road Not Taken by Robert Frost Free Essay Example. The Road Not Taken Analysis Poetry Fiction amp; Literature. Engl 102 poetry essay the road not taken. essay: Essay on the Road Not Taken by Robert Frost. 001 The Road Not Taken Robert Frost Essay Thatsnotus. quot;The Road Not Takenquot;-An analysis Poetry. Free The Road Not Taken Essays and Papers 123helpme. The Road Not Taken by Robert Frost Self love quotes, The road not .... Descriptive essay: The road not taken analysis essay. The road not taken essay. Metaphors In The Road Not Taken. 2022-11-10. Essay On The Road Not Taken. Essay the road not taken. The Road Not Taken Example Essay Poetry Cognition. The Road Not Taken Essay English Advanced - Year 12 HSC Thinkswap. The Road Not Taken Analysis Essay Telegraph. The message of the road not taken. What message do we get from the .... The Road Not Taken Analysis PDF Poetry Metaphor. Road Not Taken Essay.docx - The Road Not Taken is a beautiful poem in ... Essay On The Road Not Taken Essay On The Road Not Taken. The Road Not Taken Analysis PDF Poetry Metaphor
How To Write A Conclusion On An Essay. How to Write an Essay Conclusion Parag...Chelsea Cote
Conclusion - How to write an essay - LibGuides at University of .... How To Write A Conclusion Statement For An Essay - Get Your Inspiration .... PPT - How to Write a Concluding Paragraph PowerPoint Presentation - ID .... How to Write a Conclusion for a Research Paper: 15 Steps. How to Write a Strong Conclusion Paragraph in an Argumentative Essay. Essay websites: How to write and essay conclusion. How to Write a Conclusion for an Essay 2023 - AtOnce. Essay Conclusion Example – Pigura. Your Strongest Guide, Tips, and Essay Conclusion Examples - What is a .... How To Write A Good Conclusion.
Writing A Cause And Effect Essay Outline.pdfDawn Romero
How To Write A Cause And Effect Essay | Writing Guides | Ultius. Writing a Cause and Effect Essay Outline: Scheme | Cause and effect .... How to Write a Cause and Effect Essay: The Complete Guide. Cause and effect essay. 015 Sample Cause And Effect Essay Outline Topics L ~ Thatsnotus. Cause and Effect Essay Writing: Instructions,Topics,Examples,Prewriting .... Cause and Effect Essay Outline: Types, Examples & Writing Tips. Cause & Effect Essay - Excelsior College OWL - How to Write a Cause and ....
An Overview Of The Use Of Neural Networks For Data Mining TasksKelly Taylor
This document discusses the use of neural networks for data mining tasks. It provides an overview of the knowledge discovery process, which includes data integration, cleaning, selection, transformation, data mining, and evaluation. Data mining aims to extract meaningful patterns from large datasets using techniques like neural networks, genetic algorithms, and rule induction. Neural networks are biologically inspired models that can learn nonlinear relationships. The document highlights how neural networks can be applied to tasks like classification, prediction, and cluster analysis in data mining. Examples of applications in bioinformatics and finance are also mentioned.
Stand By Me Essay - A-Level Media Studies - Marked by Teachers.com. Stand by me themes essay. Stand By Me Essay Free Essay Example. Analysis of the film Stand by Me. Stand by Me Myself essay, Stand by me, Essay. stand by me - GCSE English - Marked by Teachers.com. Stand by me - ESL worksheet by Raponxi. A Comparative Study on Four Main Characters in Stand by Me Movie .... Stand by me essay. Stand By Me Essay Sample. 2022-11-03. Stand by me movie review essay. Stand By Me Movie Review For Small .... Stand By Me Essay - A-Level Media Studies - Marked by. Stand by me teddy descriptive essay. Stand by me essay. Chris Chambers. 2019-01-11. Movie Stand By Me Free Essays - Free Essay Examples. Stand By Me -- Character Writing Assignment.doc. Chris Chambers Stand by Me Analysis Essay Example GraduateWay. Stand by me film essay. Stand by me scenes - Free Essay Sample. Stand By Me - GCSE English - Marked by Teachers.com. Stand by me. Stand By Me Essay PDF. Analysis Of The Main Characters In quot;Stand By Mequot; Essay Example .... Stand By Me Essay Telegraph. Stand by Me study guide Stand By Me Essay Stand By Me Essay
The document provides instructions on how to create and use a research dossier, including organizing sources chronologically and theoretically. It recommends creating the dossier in OneNote and outlines how to gather sources, write analysis, and code reader comments using grounded theory. Examples show how to structure the dossier sections, annotate sources, and apply a scholarly framework to the analysis.
Demonstration of core knowledgeThe following section demonstrate.docxruthannemcmullen
Demonstration of core knowledge
The following section demonstrates the core knowledge that I am qualified to graduate from Mechanical Engineering graduate program.
This section will focus on two different fields:
· Material properties and Selection
· Simulation of processes
In Material properties and Selection field, the main concept is to identify the different properties of material to meet the requirement of the design. This is the early step for mechanical engineer to select the material for manufacturing products, which means by obtaining this knowledge I am capable of implementing what I learn to help designing a product for a company. For example, the core knowledge that I obtained in one of my graduate classes can demonstrate this field. The final project of the class, shown in Fig 1., is the standard procedure of early design that will be used for manufacturing industries. The result of the project shows that I am capable of using the trade-off plot which include several factors density, Young’s modulus, yield strength, and cost to identify the material that meet constrains and objectives of the design. Moreover, understanding the definition of each material property and the corresponding limitation. Such as density will affect the mass and volume and yield strength indicates the limit if elastic behavior are the basic and also the requirement of being a master student of mechanical engineering.
Fig. 1 Material Selection Trade-off Plot
For the second field, Simulation of processes, before any complex or costly manufacturing process. It is indispensable to run the simulation before the actual process. Not only the error can be predicted in the result of the simulation but the overall result of the end product. For example, the casting process for an impeller, a rotor with blades used to increase the pressure and/or flow of a fluid, is challenging and also easy to fail. However, with the help of simulating the process, shown in Fig. 2 &3, the failure of the casting process is able to be predicted by identifying the location of maximum principle, which the growth of the crack will occur in direction perpendicular to, and maximum normal stress, which the failure will occur, to improve the actual casting process and prevent the failure of a process.
Fig. 2 Identidy the maximum principle stressFig. 3 Identify the maximun normal stress
Both two fields listed above, Material properties and Selection and Simulation of processes,
demonstrate the essential core knowledge that I obtained while studying master of mechanical engineering. The first enable me to determine which material is the most suitable for the product, which allow me to work as a design engineer. The latter help me simulate the manufacturing process which can also help me with my future to work as a process engineer.
1
A Guide for Writing a Technical Research Paper
Libby Shoop
Macalester College, Mathematics and Computer Science Department
1 Introduction
.
Arguments of DefintionChapter 9Arguments of Defi.docxjewisonantone
Arguments of Defintion
Chapter 9
Arguments of DefinitionThese arguments are particularly powerful in that they help determine what something or someone is. Thus, they can result in inclusion or exclusion.They help us recognize that classifications change over time and are the result of cultural, social, and political forces.Definitions often serve group agendas while ignoring or attempting to silence others.Often evolve from daily life.
Arguments of DefinitionWe rely on definition for successful, efficient communication.As you have experienced with the Fact Paper, our ability to make an argument is limited when we cannot appeal to values.Contrary to the belief that values diminish the validity of an argument by rendering it mere opinion, values are a necessary part of the argument.Indeed, they are the very heart of an argument.Thus, evaluative terms are notoriously difficult to define.
Formal Definitions
(pp.200-201)Questions related to genus:Is assisting in suicide a crime?Is NASCAR a sport?Is rap poetry?What is an X [insert your own choice here]
Questions related to species:Is marijuana a relatively harmless drug or a dangerous, addictive one?Is Saudi Arabia an ally or an opponent of the USA?Is TV’s “Survivor” a reality show or a game show?Is X a Y or a Z [Insert your own topic}
Questions related to conditions:Should a woman be held to the same physical requirements as a man in order to join the military?Should everyone pay the same percentage of their income taxes regardless of their income?Are high scores on the SAT’s a fair condition for entrance into universities?Must X occur in order for Y? [Insert your topic]
Questions related to the fulfillment of conditions:Should academic scholarships count as taxable income?Should nontraditional educated experiences, such as semesters abroad and internships, count for college credit?Should X be counted as Y for the purposes of Z? [Insert your topic]
In summary, keep in mind that you can approach an argument of definition by:
Formulating a definition (What is X?): “Terrorism is any non-wartime act of violence undertaken for political gain.”Negative definition (Y is not X.): “Violence undertaken as part of a revolt against an oppressive regime is not terrorism.”Definition by Example (Y is/is not X): “The Irish Republican Army is/is not a terrorist organization.”
Other items to consider:Who is your specific audience?What are the counter-arguments to your proposed definition?In other words, anticipate oppositional stances.How would you refute those stances?Do not forget about visuals and design of arguments of definition.Matching claims to definitions is critical.
8PROCEEDINGS OF THE IRE
Steps Toward Artificial Intelligence*
MARVIN MINSKYt, MEMBER, IRE
The work toward attaining "artificial intelligence" is the center of considerable computer research, design,
and application. The field is in its starting transient, characterized by many varied and independent efforts.
.
Nine-year-old Wandas teacher notices that for the past few weeks,.docxTanaMaeskm
Nine-year-old Wanda's teacher notices that for the past few weeks, Wanda has not been talking to her friends and is always sitting alone in a corner. After talking to Wanda's friends, the teacher finds out that Wanda's sixteen-year-old brother was killed in a gang fight two months ago and her parents have since separated. The teacher talks to her friend Daphne, a counselor, to see if there is anything she can do about Wanda. She wants to know if there is any way in which children and families affected by exposure to violence can be assisted with emotional impact of these events. The teacher also asks Daphne, in the role of a counselor, to call Wanda's parents to see if they would be willing to talk with her about the death of their son, their separation, and Wanda's behavior at school. Daphne is not employed or affiliated with the school.
What would be Daphne's role, as a counselor, in helping the teacher?
What do you see as important roles of a counselor working in a community?
What are the ethical responsibilities that counselors and human services professionals hold toward the community? When answering this question identify the ethical code number and definition, using your own words, of the ethical responsibilities of these professionals.
Briefly speak how you, as an ethical counselor, would respond to the teacher's request for you to speak with Wanda and her family.
DUE TODAY 10/25/16 @6PM eastern time
.
Newspapers frequently feature stories on how various democratic prin.docxTanaMaeskm
Newspapers frequently feature stories on how various democratic principles and processes contribute to democratic governance and impact a wide variety of issues, ranging from the distribution of flu vaccines to the appropriate legal venue for terrorist trials. Public policies that are formulated to address such issues come about as the result of the influence and application of various democratic principles and processes. In addition, competing interests and factions engage in the democratic process using tools such as lobbying or elections in an effort to leverage public policy. As you think about democratic principles and processes for this Assignment, take note of where you see their influence in recent public policy issues. To prepare for this Assignment: • Review the article “War v. Justice: Terrorism Cases, Enemy Combatants, and Political Justice in U.S. Courts” in this week’s Learning Resources. Take note of key democratic principles explained. Consider how the democratic principles in the article might influence public policy. • Review the articles “Strategic Lobbying: Demonstrating How Legislative Context Affects Interest Groups’ Lobbying Tactics” and “The Study of Party Factions as Competitive Political Organizations” in this week’s Learning Resources. • Think about the democratic processes used by lobbying groups and political factions to influence public policy. • Select a public policy issue related to your specialization or to an area with which you are familiar. • Select three democratic principles and/or processes that you think might influence the formulation of public policy related to your issue. • Reflect on how these principles and processes of democracy influence the formulation of the public policy you selected. The Assignment (2–3 pages): • Briefly describe the public policy issue you selected for this Assignment. • Using three democratic principles and/or processes of your choice, explain how you think these democratic principles and/or processes influence the formulation of public policy. • Based on your analysis, share at least one insight you gained about the influence of democratic principles and processes on the formulation of public policy. Or, if you live outside the United States, explain how these democratic principles might affect governance in your country.
.
The Concept of ‘Postmodernism’ Essay Example | StudyHippo.com. Postmodernism essay. Postmodernism Essay Plan | Postmodernism | Philosophical Movements. ᐅ Essays On Postmodernism
The Concept of ‘Postmodernism’ Essay Example | StudyHippo.com. Postmodernism essay. Postmodernism Essay Plan | Postmodernism | Philosophical Movements. ᐅ Essays On Postmodernism
This document provides a preface and table of contents for the book "Think Stats: Probability and Statistics for Programmers" by Allen B. Downey. The preface describes why the author wrote the book and how he wrote it, emphasizing the computational approach and use of real-world datasets. The preface also lists contributors who provided feedback. The table of contents provides an overview of the book's 7 chapters, which cover topics like descriptive statistics, probability, hypothesis testing, and more.
Running head (NAME OF THE COMPANY)’S IT PROJECT(NAME OF THE C.docxhealdkathaleen
Running head: (NAME OF THE COMPANY)’S IT PROJECT
(NAME OF THE COMPANY)’S IT PROJECT
3
(Name of the company)’s IT Project
Introduce material here… Remember, each case study must have the headings listed below and must be answered according to assignment instructions; each heading is worth a percentage of each case grade and this is how your work should be submitted. Your audience is someone like your roommate – intelligent, educated, but has NO IDEA what the case study is about. In this section, you will give a very brief overview of your company.
This section is generally one paragraph. The easiest way to explain this section is to think of it like an abstract or introduction. If written properly, this section can actually serve as the abstract for the paper. It will, in a sense, set up the rest of the paper, which is the review of the case, analysis, recommendations, and the summary and conclusions sections. Remember that you obtained this information from the textbook. Consequently, you should cite Schwalbe (2016). You should NOT write “According to the textbook” as your reader has NO IDEA who or what is that.
If there is a second paragraph, it will look like this. The paper should be written in third person narrative and not in the first person. Note: The required headings that must be in the paper are bolded and should be kept bolded. One other note: a business is an “it,” not a “they.” Remember that when you use pronouns describing a business.
Analysis of the (Your company)
In this section, you will briefly describe what you will cover. It should only take a few sentences.
History
Text will start here…
Customers
Text will start here…
Competitors
Text will start here…
Products and Services Rendered
Text will start here…
Growth
Text will start here…
Where (company) Does Business
Text will start here…
Type of Entity (corporation, sole proprietor, and so forth)
Text will start here…
How Many Employees
Text will start here…
Other Pertinent Information
Text will start here…
Type(s) of technology (the company) is Currently Using
Text will start here…
Technology Usage
Here, you will answer the question, “How the technology is being used, for what purpose?”
A Problem That Requires an IT
Solution
This is where you will answer the mandate, “The problem can be an actual problem, such as bad quality, losing customer base, etc..... or...the problem can be growth, expanding into new markets, introduction of new products and/or services, move to an online presence.”
Scope of Work to be Completed
Here, you will answer the mandate, “Identify the scope of the work, or deliverable that must be completed?”
Time Frame for the Work
Here, you will answer the mandate, “Identify a time frame for this scope of work... realistic.”
Budget for the Project
Here, you will answer the question, “Identify a budget for this project... realistic?”
Also, you must provide at least six scholarly references and cite the references in the form of in-text citations ...
PPOL 650Issue Analysis Paper InstructionsYou will submit a p.docxChantellPantoja184
PPOL 650
Issue Analysis Paper Instructions
You will submit a paper analyzing an issue related to the intersection of international law, policy, politics, and diplomacy. Upon review of the course material and topics of study, you will select a topic based on concepts studied during the course. You must identify a major international crisis, provide a factual background, collect data describing the process used to resolve the crisis, explain whether the plan used was the best course of action, and explain the outcome. You are required to compare the effectiveness of the plan in light of all the international issues, identify the specific strengths and weaknesses of the approach, and note how diplomacy was used to address the crisis. You must also include a review of alternate plans that may have been effective in resolving the issue. The paper must include a minimum of 3–5 scholarly sources (ex. books or peer reviewed articles) formatted in current Turabian style. The assignment must be 5–7 pages.
Your Issue Analysis Paper is due by 11:59 p.m. (ET) on Sunday of Module/Week 3.
Analysis on the Demand of Top Talent Introduction
in Big Data and Cloud Computing Field in China
Based on 3-F Method
Zhao Linjia, Huang Yuanxi, Wang Yinqiu, Liu Jia
National Academy of Innovation Strategy, China Association for Science and Technology, Beijing, P.R.China
Abstract—Big data and cloud computing, which can help
China to implement innovation-driven development strategy and
promote industrial transformation and upgrading, is a new and
emerging industrial field in China. Educated, productive and
healthy workforces are necessary factor to develop big data and
cloud computing industry, especially top talents are essential.
Therefore, a three-step method named 3-F has been introduced
to help describing the distribution of top talents globally and
making decision whether they are needed in China. The 3-F
method relies on calculating the brain gain index to analysis the
top talent introduction demand of a country. Firstly, Focus on the
high-frequency keywords of a specific field by retrieving the
highly cited papers. Secondly, using those keywords to Find out
the top talents of this specific field in the Web of Science. Finally,
Figure out the brain gain index to estimate whether a country
need to introduce top talents of a specific field abroad. The result
showed that the brain gain index value of China's big data and
cloud computing field was 2.61, which means China need to
introduce top talents abroad. Besides P. R. China, those top
talents mainly distributed in the United States, the United
Kingdom, Germany, Netherlands and France.
I. INTRODUCTION
Big data and cloud computing is a new and emerging
industrial field[1], and increasing widely used in China[2-4].
Talents’ experience is a source of technological mastery[5],
essentially for developing and using big data technologies.
Most European states consider the immigra.
SUBMIT ASSIGNMENT 2.1Assignment 2.1 Liberty Challenged in Ninet.docxjames891
SUBMIT ASSIGNMENT 2.1
Assignment 2.1: Liberty Challenged in Nineteenth Century America Thesis and Outline
Due Week 7 and worth 50 points
America became a free independent nation. With the signing of the Treaty of Paris in 1783, the former mother country, England, recognized that its children, the colonies, were now on their own. A constitutional republic was birthed, and thus the challenges began. Slavery, the “Peculiar Institution,” was a monumental issue facing the country. Would it die or would it survive and possibly take a nation divided with it? This sectionalism followed Americans up into the Civil War. Dissect this crisis by addressing parts I and II below.
For the next part of this assignment you will create an outline of the main points you want to address in this paper. This will serve as the basis for your Assignment 2.2 Final Draft. (Note: Please use the Purdue Owl website to assist you with this assignment; this website can be accessed at: https://owl.english.purdue.edu/engagement/2/2/55/.)
Part 1:
1. Write a thesis statement that is one to two (1-2) sentences long in which you:
a. State your thesis on the significance of this slavery issue, as exemplified in your research. Justify your response.
For the first part of this assignment you will create a thesis statement. A thesis statement is usually a single sentence somewhere in your first paragraph that presents your main idea to the reader. The body of the essay organizes the material you gather and present in support of your main idea. Keep in mind that a thesis is an interpretation of a question or subject, not the subject itself. (Note: Please consult the Purdue OWL website with tips on how to construct a proper thesis; the website can be found at: https://owl.english.purdue.edu/owl/resource/545/01/.)
Part 2:
For the next part of this assignment you will create an outline of the main points you want to address in this paper. This will serve as the basis for your Assignment 2.2 Final Draft. (Note: Please use the Purdue Owl website to assist you with this assignment; this website can be accessed at: https://owl.english.purdue.edu/engagement/2/2/55/.)2. Write a one to two (1-2) page outline in which you:
a. Describe two (2) outcomes of the 3/5ths Compromise, Missouri Compromise of 1820, Compromise of 1850, Kansas-Nebraska Act, and the Dred Scott Decision. Note: Be sure to provide two (2) outcomes for each legislation.
b. Suggest three (3) reasons why slavery was and is incompatible with our political and economic system.
c. List three to five (3-5) driving forces that led to the Civil War.
d. Use at least three (3) academic references besides or in addition to the textbook. Note: Wikipedia and other similar websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SW.
Concept and example of a semantic solution implemented with SQL views to cooperate with users on queries over structured data with independence from database schema knowledge and technology.
ESSAY ON SECTION 5 INFORMAL PROCESSES AND DISCRETION (Due 11.docxtheodorelove43763
This document provides instructions for an essay assignment on informal processes and discretion in public administration. It includes a scenario where the reader works for the Oregon Liquor Control Commission Recreational Marijuana Licensing Office, which has two scheduled video meetings - one with an 80-year-old grandmother interested in opening a dispensary, and one with a large marijuana company interested in guaranteed licensing for new retail outlets. It then provides three questions analyzing the importance of informal processes, potential inaccuracies in advice provided, and how courts review agency discretion.
Text mining and its association analysis.pdfKyusonLim
This document summarizes and analyzes the results of 6 different text mining methods - wordcloud, co-occurrence analysis, hierarchical clustering, k-medoids clustering, time series analysis using local smoothing regression, and Gaussian graphical models - that were used to analyze unstructured text data from Statistics Canada on issues in Canada during the COVID-19 pandemic in 2020. It finds that while the methods provide some varying results, the biterm topic model (BTM) method overall provides the most coherent and consistent topics by grouping keywords into 5 main clusters related to health, business, personal impacts, and economic issues.
Essay On The Road Not Taken. The Road Not Taken Analysis PDF Poetry MetaphorWendy Fricke
The road not taken by robert frost paraphrase. TEXT TO ANALYSIS ESSAY .... The Road not Taken Poem Analysis - Free Essay Example - 487 Words .... The Road Not Taken Poem by Robert Frost Motivational Poster - Etsy. School essay: Road not taken essay. The Road Not Taken Full Poem Robert Frost Literary Poster - Etsy. quot;The Road Not Takenquot; Analysis Activity for Google Drive Poetry .... An Analysis of Tone in The Road Not Taken, a Poem by Robert Frost .... English Essay The Road Not Taken PDF Poetry. The road not taken summary and theme - thingslopers. Unique The Road Not Taken Essay Thatsnotus. Essay On The Road Not Taken By Robert Frost uvadyru7by. The Road Not Taken Poetry Fiction amp; Literature. Road not taken interpretation essay examples. Critical appreciation of the poem the road not taken. Critical .... The Road Not Taken by Robert Frost Free Essay Example. The Road Not Taken Analysis Poetry Fiction amp; Literature. Engl 102 poetry essay the road not taken. essay: Essay on the Road Not Taken by Robert Frost. 001 The Road Not Taken Robert Frost Essay Thatsnotus. quot;The Road Not Takenquot;-An analysis Poetry. Free The Road Not Taken Essays and Papers 123helpme. The Road Not Taken by Robert Frost Self love quotes, The road not .... Descriptive essay: The road not taken analysis essay. The road not taken essay. Metaphors In The Road Not Taken. 2022-11-10. Essay On The Road Not Taken. Essay the road not taken. The Road Not Taken Example Essay Poetry Cognition. The Road Not Taken Essay English Advanced - Year 12 HSC Thinkswap. The Road Not Taken Analysis Essay Telegraph. The message of the road not taken. What message do we get from the .... The Road Not Taken Analysis PDF Poetry Metaphor. Road Not Taken Essay.docx - The Road Not Taken is a beautiful poem in ... Essay On The Road Not Taken Essay On The Road Not Taken. The Road Not Taken Analysis PDF Poetry Metaphor
How To Write A Conclusion On An Essay. How to Write an Essay Conclusion Parag...Chelsea Cote
Conclusion - How to write an essay - LibGuides at University of .... How To Write A Conclusion Statement For An Essay - Get Your Inspiration .... PPT - How to Write a Concluding Paragraph PowerPoint Presentation - ID .... How to Write a Conclusion for a Research Paper: 15 Steps. How to Write a Strong Conclusion Paragraph in an Argumentative Essay. Essay websites: How to write and essay conclusion. How to Write a Conclusion for an Essay 2023 - AtOnce. Essay Conclusion Example – Pigura. Your Strongest Guide, Tips, and Essay Conclusion Examples - What is a .... How To Write A Good Conclusion.
Writing A Cause And Effect Essay Outline.pdfDawn Romero
How To Write A Cause And Effect Essay | Writing Guides | Ultius. Writing a Cause and Effect Essay Outline: Scheme | Cause and effect .... How to Write a Cause and Effect Essay: The Complete Guide. Cause and effect essay. 015 Sample Cause And Effect Essay Outline Topics L ~ Thatsnotus. Cause and Effect Essay Writing: Instructions,Topics,Examples,Prewriting .... Cause and Effect Essay Outline: Types, Examples & Writing Tips. Cause & Effect Essay - Excelsior College OWL - How to Write a Cause and ....
An Overview Of The Use Of Neural Networks For Data Mining TasksKelly Taylor
This document discusses the use of neural networks for data mining tasks. It provides an overview of the knowledge discovery process, which includes data integration, cleaning, selection, transformation, data mining, and evaluation. Data mining aims to extract meaningful patterns from large datasets using techniques like neural networks, genetic algorithms, and rule induction. Neural networks are biologically inspired models that can learn nonlinear relationships. The document highlights how neural networks can be applied to tasks like classification, prediction, and cluster analysis in data mining. Examples of applications in bioinformatics and finance are also mentioned.
Stand By Me Essay - A-Level Media Studies - Marked by Teachers.com. Stand by me themes essay. Stand By Me Essay Free Essay Example. Analysis of the film Stand by Me. Stand by Me Myself essay, Stand by me, Essay. stand by me - GCSE English - Marked by Teachers.com. Stand by me - ESL worksheet by Raponxi. A Comparative Study on Four Main Characters in Stand by Me Movie .... Stand by me essay. Stand By Me Essay Sample. 2022-11-03. Stand by me movie review essay. Stand By Me Movie Review For Small .... Stand By Me Essay - A-Level Media Studies - Marked by. Stand by me teddy descriptive essay. Stand by me essay. Chris Chambers. 2019-01-11. Movie Stand By Me Free Essays - Free Essay Examples. Stand By Me -- Character Writing Assignment.doc. Chris Chambers Stand by Me Analysis Essay Example GraduateWay. Stand by me film essay. Stand by me scenes - Free Essay Sample. Stand By Me - GCSE English - Marked by Teachers.com. Stand by me. Stand By Me Essay PDF. Analysis Of The Main Characters In quot;Stand By Mequot; Essay Example .... Stand By Me Essay Telegraph. Stand by Me study guide Stand By Me Essay Stand By Me Essay
The document provides instructions on how to create and use a research dossier, including organizing sources chronologically and theoretically. It recommends creating the dossier in OneNote and outlines how to gather sources, write analysis, and code reader comments using grounded theory. Examples show how to structure the dossier sections, annotate sources, and apply a scholarly framework to the analysis.
Demonstration of core knowledgeThe following section demonstrate.docxruthannemcmullen
Demonstration of core knowledge
The following section demonstrates the core knowledge that I am qualified to graduate from Mechanical Engineering graduate program.
This section will focus on two different fields:
· Material properties and Selection
· Simulation of processes
In Material properties and Selection field, the main concept is to identify the different properties of material to meet the requirement of the design. This is the early step for mechanical engineer to select the material for manufacturing products, which means by obtaining this knowledge I am capable of implementing what I learn to help designing a product for a company. For example, the core knowledge that I obtained in one of my graduate classes can demonstrate this field. The final project of the class, shown in Fig 1., is the standard procedure of early design that will be used for manufacturing industries. The result of the project shows that I am capable of using the trade-off plot which include several factors density, Young’s modulus, yield strength, and cost to identify the material that meet constrains and objectives of the design. Moreover, understanding the definition of each material property and the corresponding limitation. Such as density will affect the mass and volume and yield strength indicates the limit if elastic behavior are the basic and also the requirement of being a master student of mechanical engineering.
Fig. 1 Material Selection Trade-off Plot
For the second field, Simulation of processes, before any complex or costly manufacturing process. It is indispensable to run the simulation before the actual process. Not only the error can be predicted in the result of the simulation but the overall result of the end product. For example, the casting process for an impeller, a rotor with blades used to increase the pressure and/or flow of a fluid, is challenging and also easy to fail. However, with the help of simulating the process, shown in Fig. 2 &3, the failure of the casting process is able to be predicted by identifying the location of maximum principle, which the growth of the crack will occur in direction perpendicular to, and maximum normal stress, which the failure will occur, to improve the actual casting process and prevent the failure of a process.
Fig. 2 Identidy the maximum principle stressFig. 3 Identify the maximun normal stress
Both two fields listed above, Material properties and Selection and Simulation of processes,
demonstrate the essential core knowledge that I obtained while studying master of mechanical engineering. The first enable me to determine which material is the most suitable for the product, which allow me to work as a design engineer. The latter help me simulate the manufacturing process which can also help me with my future to work as a process engineer.
1
A Guide for Writing a Technical Research Paper
Libby Shoop
Macalester College, Mathematics and Computer Science Department
1 Introduction
.
Arguments of DefintionChapter 9Arguments of Defi.docxjewisonantone
Arguments of Defintion
Chapter 9
Arguments of DefinitionThese arguments are particularly powerful in that they help determine what something or someone is. Thus, they can result in inclusion or exclusion.They help us recognize that classifications change over time and are the result of cultural, social, and political forces.Definitions often serve group agendas while ignoring or attempting to silence others.Often evolve from daily life.
Arguments of DefinitionWe rely on definition for successful, efficient communication.As you have experienced with the Fact Paper, our ability to make an argument is limited when we cannot appeal to values.Contrary to the belief that values diminish the validity of an argument by rendering it mere opinion, values are a necessary part of the argument.Indeed, they are the very heart of an argument.Thus, evaluative terms are notoriously difficult to define.
Formal Definitions
(pp.200-201)Questions related to genus:Is assisting in suicide a crime?Is NASCAR a sport?Is rap poetry?What is an X [insert your own choice here]
Questions related to species:Is marijuana a relatively harmless drug or a dangerous, addictive one?Is Saudi Arabia an ally or an opponent of the USA?Is TV’s “Survivor” a reality show or a game show?Is X a Y or a Z [Insert your own topic}
Questions related to conditions:Should a woman be held to the same physical requirements as a man in order to join the military?Should everyone pay the same percentage of their income taxes regardless of their income?Are high scores on the SAT’s a fair condition for entrance into universities?Must X occur in order for Y? [Insert your topic]
Questions related to the fulfillment of conditions:Should academic scholarships count as taxable income?Should nontraditional educated experiences, such as semesters abroad and internships, count for college credit?Should X be counted as Y for the purposes of Z? [Insert your topic]
In summary, keep in mind that you can approach an argument of definition by:
Formulating a definition (What is X?): “Terrorism is any non-wartime act of violence undertaken for political gain.”Negative definition (Y is not X.): “Violence undertaken as part of a revolt against an oppressive regime is not terrorism.”Definition by Example (Y is/is not X): “The Irish Republican Army is/is not a terrorist organization.”
Other items to consider:Who is your specific audience?What are the counter-arguments to your proposed definition?In other words, anticipate oppositional stances.How would you refute those stances?Do not forget about visuals and design of arguments of definition.Matching claims to definitions is critical.
8PROCEEDINGS OF THE IRE
Steps Toward Artificial Intelligence*
MARVIN MINSKYt, MEMBER, IRE
The work toward attaining "artificial intelligence" is the center of considerable computer research, design,
and application. The field is in its starting transient, characterized by many varied and independent efforts.
.
Similar to English 103 Final TestReading Poetry for 10Answer all five (19)
Nine-year-old Wandas teacher notices that for the past few weeks,.docxTanaMaeskm
Nine-year-old Wanda's teacher notices that for the past few weeks, Wanda has not been talking to her friends and is always sitting alone in a corner. After talking to Wanda's friends, the teacher finds out that Wanda's sixteen-year-old brother was killed in a gang fight two months ago and her parents have since separated. The teacher talks to her friend Daphne, a counselor, to see if there is anything she can do about Wanda. She wants to know if there is any way in which children and families affected by exposure to violence can be assisted with emotional impact of these events. The teacher also asks Daphne, in the role of a counselor, to call Wanda's parents to see if they would be willing to talk with her about the death of their son, their separation, and Wanda's behavior at school. Daphne is not employed or affiliated with the school.
What would be Daphne's role, as a counselor, in helping the teacher?
What do you see as important roles of a counselor working in a community?
What are the ethical responsibilities that counselors and human services professionals hold toward the community? When answering this question identify the ethical code number and definition, using your own words, of the ethical responsibilities of these professionals.
Briefly speak how you, as an ethical counselor, would respond to the teacher's request for you to speak with Wanda and her family.
DUE TODAY 10/25/16 @6PM eastern time
.
Newspapers frequently feature stories on how various democratic prin.docxTanaMaeskm
Newspapers frequently feature stories on how various democratic principles and processes contribute to democratic governance and impact a wide variety of issues, ranging from the distribution of flu vaccines to the appropriate legal venue for terrorist trials. Public policies that are formulated to address such issues come about as the result of the influence and application of various democratic principles and processes. In addition, competing interests and factions engage in the democratic process using tools such as lobbying or elections in an effort to leverage public policy. As you think about democratic principles and processes for this Assignment, take note of where you see their influence in recent public policy issues. To prepare for this Assignment: • Review the article “War v. Justice: Terrorism Cases, Enemy Combatants, and Political Justice in U.S. Courts” in this week’s Learning Resources. Take note of key democratic principles explained. Consider how the democratic principles in the article might influence public policy. • Review the articles “Strategic Lobbying: Demonstrating How Legislative Context Affects Interest Groups’ Lobbying Tactics” and “The Study of Party Factions as Competitive Political Organizations” in this week’s Learning Resources. • Think about the democratic processes used by lobbying groups and political factions to influence public policy. • Select a public policy issue related to your specialization or to an area with which you are familiar. • Select three democratic principles and/or processes that you think might influence the formulation of public policy related to your issue. • Reflect on how these principles and processes of democracy influence the formulation of the public policy you selected. The Assignment (2–3 pages): • Briefly describe the public policy issue you selected for this Assignment. • Using three democratic principles and/or processes of your choice, explain how you think these democratic principles and/or processes influence the formulation of public policy. • Based on your analysis, share at least one insight you gained about the influence of democratic principles and processes on the formulation of public policy. Or, if you live outside the United States, explain how these democratic principles might affect governance in your country.
.
Nice thought process and good example of foot into the door” ).docxTanaMaeskm
Nice thought process and good example of “foot into the door” :)!
You also appear to be a very smart person when it comes to being ware of other that may take advantage of one’s
Kindness!
Why do you think some people take advantage of the “foot into the door” in a negative way? What are your views on this? Other students may chime in! I love to hear
your views!!!!
Thanks for sharing and stay positive!
.
NIST and Risk Governance and Risk Management Please respond to the.docxTanaMaeskm
"NIST and Risk Governance and Risk Management" Please respond to the following:
NIST provides many procedures and much guidance on IT and information security-related topics.
Assess if NIST is too large and attempts to cover too many topics. Decide if NIST should separate into different entities for different major areas, such as IT governance, risk management, information security, and others.
Assess if the various NIST documents covering risk management topics and concepts are too spread out and should be more consolidated to provide better guidance to organizations when they are establishing risk management programs.
.
Nice thought process ;)!Some in social media agree with your v.docxTanaMaeskm
Nice thought process ;)!
Some in social media agree with your views:"… involving a breakdown in the relation between thought, emotion, and behavior,”.
Santrock (2006) support your views on this topic and also noted that one main type of schizophrenia is cationic (exhibits bizarre behavior, frequently causes immobile stupor
).
Do you think most people are aware that there are more than one type of schizophrenia?
What are your views on this?
Other students may chime in! I would love to hear your views ;)!
.
Newsletter pertaining to an oceanographic environmental issue 1500.docxTanaMaeskm
Newsletter pertaining to an oceanographic environmental issue
1500 words with minimum of 6 references.
must be submitted by Dec 10
Please do the newsletter talks about the Chinese fishery, mainly focus on the damage they made to the environment.
1500 words , with some well-designed pictures
due dec10th
please do more than 6 references, use the information get from references
please follow the format if the sample I attached.
.
Nicole Martins is the controller at UMC Corp., a publicly-traded man.docxTanaMaeskm
Nicole Martins is the controller at UMC Corp., a publicly-traded manufacturing company. Last year, UMC had annual sales revenue of $15 million. The first quarter of this year just ended, and Nicole needs to prepare a trial balance so she can prepare the quarterly financial statements. However, trial balance is out of balance by $750 (credits exceed debits).
Nicole is running out of time as the report is due today! Therefore, she decides to balance by plugging the $750 into the Equipment account. She chose the Equipment account because it has the largest account balance. Therefore, with the $750 added, it will be the least-misstated account.
Identify the stakeholders in the case.
Explain the ethical issues the case involves.
If you were Nicole, what would you do?
.
New and Orignal work. Please cite in MLA citation and use in text ci.docxTanaMaeskm
New and Orignal work. Please cite in MLA citation and use in text citations for the other sources you use. This essay is two pages long. I will list the poems this essay will be on below. Please highlight where you cite these poems so I can know where to add the in text citation. I need this essay completed by 8:00 pm sunday.
Theme: Loss of faith in institutional, cultural, and social foundation that could provide stability in the world
Poems: T.S. Eliot " The Waste Land"
W.B. Yeats " The Second Coming"
James Joyce "Ulysses"
.
New and Origninal work. The topic is already provided below and I ne.docxTanaMaeskm
New and Origninal work. The topic is already provided below and I need it to be 2 pages no limit on word count. Make sure it is MLA cited and the paragraghs are detailed explaining which charasteristic you are referring to. The writings are coming from the Norton Anthology English Literature Book The Victorian Age Volume E. I have attached the three writings from the book that I would like you to use for this essay. Let me know if you need a better copy scanned and I will be happy to rescan it.
Assignment Description
: Write a short (2 page) essay using selections from the texts that demonstrate the characteristic below.
Remember it takes more than 2 data points to indicate a trend. You will need to
choose 3 different writers
to show there was a prevailing tendency toward the characteristic you choose.
Explain fully how the characteristic is shown by detailed explication of the works you choose. Make sure references are integrated and cited according to MLA conventions.
Literature of this age tends to come closer to daily life and reflects its practical problems and interests. It becomes a powerful instrument for human progress. Socially & economically, industrialism was on the rise as well as various reform movements such as emancipation, child labor, women’s rights, and evolution.
.
New essay -- minimum 300 words3 resources used NO cover sheet or.docxTanaMaeskm
The assignment requires a minimum 300-word essay using 3 resources including a required Harris book chapter attached, with no cover sheet or headers. The essay topic is to discuss Harris' hypothesis for patterns of people-eating and insect-eating in certain societies compared to others and what other sources suggest to explain these patterns.
Neurological DisordersNeurological disorders, such as headaches, s.docxTanaMaeskm
Neurological Disorders
Neurological disorders, such as headaches, seizure disorders, sleep disorders, depression, and dementia, can present several complications for patients of all ages. These disorders affect patients physically and emotionally, impacting judgment, school and/or job performance, and relationships with family and friends. Since these disorders may have drastic effects on patients’ lives, it is important for advanced practice nurses to effectively manage patient care. With patient factors and medical history in mind, it is the nurse’s responsibility to assist physicians in the diagnosis, treatment, and education of patients with neurological disorders.
To prepare:
·
Review this week’s media presentations on the nervous system.
·
Select one of the following neurological disorders: headaches, seizure disorders, sleep disorders, depression, or dementia. Consider the pathophysiology, as well as the types of drugs that would be prescribed to patients to treat your selected disorder.
·
Select one of the following factors: genetics, gender, ethnicity, age, or behavior. Consider how the factor you selected might impact the pathophysiology of the disorder. Then, reflect on how this factor might impact the effects of prescribed drugs, as well as measures you might take to help reduce any negative side effects.
·
Locate an agency that provides patient education on your selected disorder and review the available materials and curriculum. Consider how you might be able to use those materials to educate a patient on the disorder, treatment options, management, and self-care.
Questions to be addressed in my paper:
1.
A description of the neurological disorder you selected, including its pathophysiology and types of drugs that would be prescribed to treat patients.
2.
Explain how the factor you selected might impact the pathophysiology of the disorder, as well as the effects of prescribed drugs.
3.
Include a description of measures you might take to help reduce any negative side effects.
4.
Finally, explain how you would use materials from a supporting agency to educate patients on the disorder, treatment options, management, and self-care.
5.
Summary with Conclusion
REMINDERS:
1)
2-3 pages (addressing the 4 questions above excluding the title page and reference page).
2)
Kindly follow APA format for the citation and references! References should be between the period of 2011 and 2016. Please utilize the references at least three below as much as possible and the rest from yours.
3)
Make headings for each question.
References:
Readings
·
Huether, S. E., & McCance, K. L. (2012).
Understanding pathophysiology
(Laureate custom ed.). St. Louis, MO: Mosby.
o
Chapter 12, “Structure and Function of the Neurologic System”
This chapter begins with an overview of the structure and function of the nervous system. It also explains the importance of the central, peripheral, and autonomic nervous systems.
o
Chapter 13, “Pain, Tempe.
Neurodevelopmental and Neurocognitive Disorders Paper··I.docxTanaMaeskm
This paper discusses two neurological disorders, one neurodevelopmental and one neurocognitive. It describes the behavioral criteria and incidence rates and causes of each disorder. It also proposes two treatment options for each disorder based on different theoretical models, formatted according to APA style with references.
Needs to be done by 8pm central time!!!!!!An important aspect .docxTanaMaeskm
Needs to be done by 8pm central time!!!!!!
An important aspect of a research study is the ability to analyze data and then describe the statistics derived from that data in a form that is easy to understand and interpret. For quantitative data, this can include representing the data visually through tables, diagrams, and graphs. Review the quantitative descriptive statistic examples in the sport involvement article.
2-3 pages APA Format.
message for extra information.
.
Need to know about 504 plan and IEP. I need to research the process.docxTanaMaeskm
Need to know about 504 plan and IEP. I need to research the process of determining a child with OHI (Other Health Inpairment. 1 of the sources needs to be DPI (Department of Public Instruction for Wisconsin). I would like a power point presentaion along with what I should be said with each slide. APA format
.
Nelson Carson is a 62-year-old man who presents to his private pract.docxTanaMaeskm
Nelson Carson is a 62-year-old man who presents to his private practitioner’s office with a hacking, raspy cough.
Subjective Data
PMH: HTN, CAD
Cough is productive, bringing up green, thick phlegm
Runny nose, sore throat
No history of smoking or seasonal allergies
Complains of fatigue
Objective Data
Vital signs: T 37 P 72 R 14 BP 134/64
Lungs: + Rhonchi bilateral upper lobes, wheezes
O2 Sat = 98%
Medications: Metoprolol 25 mg per day, ASA 325 mg/daily
What other questions should the nurse ask about the cough?
What nursing diagnoses can be derived from the data?
What should be included in the plan of care?
What risk factors are associated with this age group?
Based on the readings, what is the most likely cause of cough for this patient?
Apa format
Reference
Jarvis, C. (2016).
Physical examination & health assessment
(7th ed.). Philadelphia, PA: Saunders.
Chapter 18: Thorax and Lungs
pp. 413–441 (Structure, Function, The Thoracic Cavity, Developmental Competence, Subjective Data, Objective Data)
Chapter 19: Heart and Neck Vessels
pp. 459–492 (Structure and Function, Heart Wall, Chambers, and Valves, Heart Sounds, Developmental Competence, Subjective Data, Objective Data )
Chapter 20: Peripheral Vascular System and Lymphatic System
pp. 509–529 (Structure and Function, Lymphatics, Developmental Competence, Subjective Data, Objective Data)
.
Negotiation strategiesUsing the text Negotiation Readings, Exerc.docxTanaMaeskm
Negotiation strategies
Using the text “Negotiation: Readings, Exercisers, and Cases” by Lewicki, prepare a 1,400-1,750-word paper in which you analyze the possible intervention strategies. Apply what you believe to be the best strategy and explain how it should resolve the conflict. In case your best strategy does not work, or is rejected, develop and describe at least one contingency plan.
Instructions
Major points are stated clearly; are supported by specific details, examples, or analysis; and are organized logically.
1) Article Employs Negotiation strategy
2) Described Negotiation process
3) Compared and contrasted both strategies / work / home
Responsible for combining all sections, editing for flow, uploading draft for team review, submitting the final assignment (on time)
Expand view
.
Needs to be done in the next 3-4 hours .docxTanaMaeskm
The document indicates that there is something that needs to be done within the next 3-4 hours. No other details are provided about the task. The brevity of the document leaves many unknowns about what specifically needs to be accomplished during this timeframe.
Needs quotes and needs to be citied!!about 2 pages.NO PLAGARISM..docxTanaMaeskm
Needs quotes and needs to be citied!!
about 2 pages.
NO PLAGARISM. Looking for authetnitc work.
MLA
Summary from the following sections.
Vatican II. Gaudium et Spes. 1965. 12-18. Print. [available in Many are Called]
Rahner, Karl. Theological Investigations. Trans. C. Ernst. London: Darton, Longman & Todd, 1966. Print. [available in Many are Called]
Vol. 6, 390-398
Vol. 14, 280-294
Wong, Norman. "Karl Rahner’s Concept of the ‘Anonymous Christian’ An Inclusivist View of Religions." Church and Society, 4.1 (2001): 23-39. Print. [available in Many are Called] (Optional reading)
.
need to work on my present assignment using my last assignment as .docxTanaMaeskm
need to work on my present assignment using my last assignment as source
need 3 pages document and 1 page reference
Should concentrate on what authors discuss on that specific topic
Should be in IEEE Format
No Plagiarism
Willing to do changes references should be in IEEE format Important
• 1st attachment is question for the assignment
• 2nd attachment is topic you need to work on this project
• 3rd attachment my project should be also in same format
.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
English 103 Final TestReading Poetry for 10Answer all five
1. English 103 Final Test
Reading Poetry for 10%
Answer all five the questions below. For simplicity, you may
type your work directly onto this document. Limit each of your
answers (e.g. 1a etc.) to approximately four or five sentences.
Before you begin, a note on citing poetry references in MLA
style. Direct quotations should be followed by a parenthetical
citation that displays the relevant line number(s): for example,
“moonless night rim world” (Lowther 2). Short quotations of
three lines or less should be enmeshed in your prose and line
breaks should be recorded with a slash: for example, “moonless
night rim world, / A long-dead city” (Lowther 2-3). No need to
provide a list of works cited for the poems at the end of your
test paper, if you are using the digital reading package for this
course. However, if you consult any secondary sources you
must fully reference each and every one.
1. “Vancity’ (2 marks)
a. What is the speaker’s situation? Integrate some quoted
evidence in your answer.
b. How does Lowther use metaphor skilfully in this poem?
2. “take a st. and” (2 marks)
a. Why is the speaker in this poem care what’s happening to the
water under a street corner in Vancouver?
b. How does the poet arrange text on the page to reflect a
central theme in the poem?
3. “What Jack Shadbolt said” (2 marks)
a. Why are Jack Shadbolt’s words important to the speaker in
this poem?
2. b. How does the poet (Carolan) organize the stanzas and line
breaks to guide the reader through the poem?
4. “happy birthday dear house” (2 marks)
a. Which sounds and images in this poem most vividly evoke
the speaker’s childhood?
b. How do you interpret the lines, “in the land/of the second
chance” (lines 20-21)?
5. “Quayside” (2 marks)
a. Identify a central theme in this poem and comment on how
the poet (Lau) explores it. Include a few short direct quotes in
your answer.
b. Why are the lines “—and then I saw that for years/you have
existed all around me” (12-13) especially significant in this
poem?
3. ( (
P A N G . N I N G T A N
M i c h i g a n S t a t e U n i v e r s i t y
M I C H A E L S T E I N B A C H
U n i v e r s i t y o f M i n n e s o t a
V I P I N K U M A R
U n i v e r s i t y o f M i n n e s o t a
a n d A r m y H i g h P e r f o r m a n c e
C o m p u t i n g R e s e a r c h C e n t e r
+f.f_l crf.rfh. .W if f
aqtY 6l$
t . T . R . C .
i'&'ufe61ttt1/.
Y t. $t,/,1'
n,5 . 7 V
' 4 8 !
Boston San Francisco NewYork
London Toronto Sydney Tokyo Singapore Madrid
MexicoCity Munich Paris CapeTown HongKong Montreal
G.R
r+6,q
4. If you purchased this book within the United States or Canada
you should be aware that it has been
wrongfirlly imported without the approval of the Publishel or
the Author.
T3
Loo 6
- {)gq*
3 AcquisitionsEditor Matt Goldstein
ProjectEditor Katherine Harutunian
Production Supervisor Marilyn Lloyd
Production Services Paul C. Anagnostopoulos of Windfall
Software
Marketing Manager Michelle Brown
Copyeditor Kathy Smith
Proofreader IenniferMcClain
Technicallllustration GeorgeNichols
Cover Design Supervisor Joyce Cosentino Wells
Cover Design Night & Day Design
Cover Image @ 2005 Rob Casey/Brand X pictures
hepress and Manufacturing Caroline Fell
Printer HamiltonPrinting
Access the latest information about Addison-Wesley titles from
our iWorld Wide Web site:
http : //www. aw-bc.com/computing
Many of the designations used by manufacturers and sellers to
distiriguish their products
are claimed as trademarks. where those designations appear in
this book, and Addison-
Wesley was aware of a trademark claim, the designations have
been printed in initial caps
5. or all caps.
The programs and applications presented in this book have been
incl,[rded for their
instructional value. They have been tested with care, but are not
guatanteed for any
particular purpose. The publisher does not offer any warranties
or representations, nor does
it accept any liabilities with respect to the programs or
applications.
Copyright @ 2006 by Pearson Education, Inc.
For information on obtaining permission for use of material in
this work, please submit a
written request to Pearson Education, Inc., Rights and Contract
Department, 75 Arlington
Street, Suite 300, Boston, MA02II6 or fax your request to (617)
g4g-j047.
All rights reserved. No part of this publication may be
reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying,
recording, or any other media embodiments now known or
hereafter to become known,
without the prior written permission of the publisher. printed in
the united States of
America.
lsBN 0-321-42052-7
2 3 4 5 67 8 9 10-HAM-O8 07 06
6. our famili,es
Preface
Advances in data generation and collection are producing data
sets of mas-
sive size in commerce and a variety of scientific disciplines.
Data warehouses
store details of the sales and operations of businesses, Earth-
orbiting satellites
beam high-resolution images and sensor data back to Earth, and
genomics ex-
periments generate sequence, structural, and functional data for
an increasing
number of organisms. The ease with which data can now be
gathered and
stored has created a new attitude toward data analysis: Gather
whatever data
you can whenever and wherever possible. It has become an
article of faith
that the gathered data will have value, either for the purpose
that initially
motivated its collection or for purposes not yet envisioned.
The field of data mining grew out of the limitations of current
data anal-
ysis techniques in handling the challenges posedl by these new
types of data
sets. Data mining does not replace other areas of data analysis,
but rather
takes them as the foundation for much of its work. While some
areas of data
7. mining, such as association analysis, are unique to the field,
other areas, such
as clustering, classification, and anomaly detection, build upon
a long history
of work on these topics in other fields. Indeed, the willingness
of data mining
researchers to draw upon existing techniques has contributed to
the strength
and breadth of the field, as well as to its rapid growth.
Another strength of the field has been its emphasis on
collaboration with
researchers in other areas. The challenges of analyzing new
types of data
cannot be met by simply applying data analysis techniques in
isolation from
those who understand the data and the domain in which it
resides. Often, skill
in building multidisciplinary teams has been as responsible for
the success of
data mining projects as the creation of new and innovative
algorithms. Just
as, historically, many developments in statistics were driven by
the needs of
agriculture, industry, medicine, and business, rxrany of the
developments in
data mining are being driven by the needs of those same fields.
This book began as a set of notes and lecture slides for a data
mining
course that has been offered at the University of Minnesota
since Spring 1998
to upper-division undergraduate and graduate Students.
Presentation slides
8. viii Preface
and exercises developed in these offerings grew with time and
served as a basis
for the book. A survey of clustering techniques in data mining,
originally
written in preparation for research in the area, served as a
starting point
for one of the chapters in the book. Over time, the clustering
chapter was
joined by chapters on data, classification, association analysis,
and anomaly
detection. The book in its current form has been class tested at
the home
institutions of the authors-the University of Minnesota and
Michigan State
University-as well as several other universities.
A number of data mining books appeared in the meantime, but
were not
completely satisfactory for our students primarily graduate and
undergrad-
uate students in computer science, but including students from
industry and
a wide variety of other disciplines. Their mathematical and
computer back-
grounds varied considerably, but they shared a common goal: to
learn about
data mining as directly as possible in order to quickly apply it
to problems
in their own domains. Thus, texts with extensive mathematical
or statistical
prerequisites were unappealing to many of them, as were texts
that required a
substantial database background. The book that evolved in
9. response to these
students needs focuses as directly as possible on the key
concepts of data min-
ing by illustrating them with examples, simple descriptions of
key algorithms,
and exercises.
Overview Specifically, this book provides a comprehensive
introduction to
data mining and is designed to be accessible and useful to
students, instructors,
researchers, and professionals. Areas covered include data
preprocessing, vi-
sualization, predictive modeling, association analysis,
clustering, and anomaly
detection. The goal is to present fundamental concepts and
algorithms for
each topic, thus providing the reader with the necessary
background for the
application of data mining to real problems. In addition, this
book also pro-
vides a starting point for those readers who are interested in
pursuing research
in data mining or related fields.
The book covers five main topics: data, classification,
association analysis,
clustering, and anomaly detection. Except for anomaly
detection, each of these
areas is covered in a pair of chapters. For classification,
association analysis,
and clustering, the introductory chapter covers basic concepts,
representative
algorithms, and evaluation techniques, while the more advanced
chapter dis-
cusses advanced concepts and algorithms. The objective is to
10. provide the
reader with a sound understanding of the foundations of data
mining, while
still covering many important advanced topics. Because of this
approach, the
book is useful both as a learning tool and as a reference.
Preface ix
To help the readers better understand the concepts that have
been pre-
sented, we provide an extensive set of examples, figures, and
exercises. Bib-
Iiographic notes are included at the end of each chapter for
readers who are
interested in more advanced topics, historically important
papers, and recent
trends. The book also contains a comprehensive subject and
author index.
To the Instructor As a textbook, this book is suitable for a wide
range
of students at the advanced undergraduate or graduate level.
Since students
come to this subject with diverse backgrounds that may not
include extensive
knowledge of statistics or databases, our book requires minimal
prerequisites-
no database knowledge is needed and we assume only a modest
background
in statistics or mathematics. To this end, the book was designed
to be as
self-contained as possible. Necessary material from statistics,
linear algebra,
11. and machine learning is either integrated into the body of the
text, or for some
advanced topics, covered in the appendices.
Since the chapters covering major data mining topics are self-
contained,
the order in which topics can be covered is quite flexible. The
core material
is covered in Chapters 2, 4, 6, 8, and 10. Although the
introductory data
chapter (2) should be covered first, the basic classification,
association analy-
sis, and clustering chapters (4, 6, and 8, respectively) can be
covered in any
order. Because of the relationship of anomaly detection (10) to
classification
(4) and clustering (8), these chapters should precede Chapter
10. Various
topics can be selected from the advanced classification,
association analysis,
and clustering chapters (5, 7, and 9, respectively) to fit the
schedule and in-
terests of the instructor and students. We also advise that the
lectures be
augmented by projects or practical exercises in data mining.
Although they
are time consuming, such hands-on assignments greatly enhance
the value of
the course.
Support Materials The supplements for the book are available at
Addison-
Wesley's Website www.aw.con/cssupport. Support materials
available to all
readers of this book include
12. PowerPoint lecture slides
Suggestions for student projects
Data mining resources such as data mining algorithms and data
sets
On-line tutorials that give step-by-step examples for selected
data mining
techniques described in the book using actual data sets and data
analysis
software
o
o
o
o
x Preface
Additional support materials, including solutions to exercises,
are available
only to instructors adopting this textbook for classroom use.
Please contact
your school's Addison-Wesley representative for information on
obtaining ac-
cess to this material. Comments and suggestions, as well as
reports of errors,
can be sent to the authors through [email protected]
Acknowledgments Many people contributed to this book. We
begin by
13. acknowledging our families to whom this book is dedicated.
Without their
patience and support, this project would have been impossible.
We would like to thank the current and former students of our
data mining
groups at the University of Minnesota and Michigan State for
their contribu-
tions. Eui-Hong (Sam) Han and Mahesh Joshi helped with the
initial data min-
ing classes. Some ofthe exercises and presentation slides that
they created can
be found in the book and its accompanying slides. Students in
our data min-
ing groups who provided comments on drafts of the book or
who contributed
in other ways include Shyam Boriah, Haibin Cheng, Varun
Chandola, Eric
Eilertson, Levent Ertoz, Jing Gao, Rohit Gupta, Sridhar Iyer,
Jung-Eun Lee,
Benjamin Mayer, Aysel Ozgur, Uygar Oztekin, Gaurav Pandey,
Kashif Riaz,
Jerry Scripps, Gyorgy Simon, Hui Xiong, Jieping Ye, and
Pusheng Zhang. We
would also like to thank the students of our data mining classes
at the Univer-
sity of Minnesota and Michigan State University who worked
with early drafbs
of the book and provided invaluable feedback. We specifically
note the helpful
suggestions of Bernardo Craemer, Arifin Ruslim, Jamshid
Vayghan, and Yu
Wei.
Joydeep Ghosh (University of Texas) and Sanjay Ranka
(University of
14. Florida) class tested early versions of the book. We also
received many useful
suggestions directly from the following UT students: Pankaj
Adhikari, Ra-
jiv Bhatia, Fbederic Bosche, Arindam Chakraborty, Meghana
Deodhar, Chris
Everson, David Gardner, Saad Godil, Todd Hay, Clint Jones,
Ajay Joshi,
Joonsoo Lee, Yue Luo, Anuj Nanavati, Tyler Olsen, Sunyoung
Park, Aashish
Phansalkar, Geoff Prewett, Michael Ryoo, Daryl Shannon, and
Mei Yang.
Ronald Kostoff (ONR) read an early version of the clustering
chapter and
offered numerous suggestions. George Karypis provided
invaluable IATEX as-
sistance in creating an author index. Irene Moulitsas also
provided assistance
with IATEX and reviewed some of the appendices. Musetta
Steinbach was very
helpful in finding errors in the figures.
We would like to acknowledge our colleagues at the University
of Min-
nesota and Michigan State who have helped create a positive
environment for
data mining research. They include Dan Boley, Joyce Chai, Anil
Jain, Ravi
Preface xi
Janardan, Rong Jin, George Karypis, Haesun Park, William F.
Punch, Shashi
15. Shekhar, and Jaideep Srivastava. The collaborators on our many
data mining
projects, who also have our gratitude, include Ramesh Agrawal,
Steve Can-
non, Piet C. de Groen, FYan Hill, Yongdae Kim, Steve
Klooster, Kerry Long,
Nihar Mahapatra, Chris Potter, Jonathan Shapiro, Kevin
Silverstein, Nevin
Young, and Zhi-Li Zhang.
The departments of Computer Science and Engineering at the
University of
Minnesota and Michigan State University provided computing
resources and
a supportive environment for this project. ARDA, ARL, ARO,
DOE, NASA,
and NSF provided research support for Pang-Ning Tan, Michael
Steinbach,
and Vipin Kumar. In particular, Kamal Abdali, Dick Brackney,
Jagdish Chan-
dra, Joe Coughlan, Michael Coyle, Stephen Davis, Flederica
Darema, Richard
Hirsch, Chandrika Kamath, Raju Namburu, N. Radhakrishnan,
James Sido-
ran, Bhavani Thuraisingham, Walt Tiernin, Maria Zemankova,
and Xiaodong
Zhanghave been supportive of our research in data mining and
high-performance
computing.
It was a pleasure working with the helpful staff at Pearson
Education. In
particular, we would like to thank Michelle Brown, Matt
Goldstein, Katherine
Harutunian, Marilyn Lloyd, Kathy Smith, and Joyce Wells. We
would also
16. like to thank George Nichols, who helped with the art work and
Paul Anag-
nostopoulos, who provided I4.T[X support. We are grateful to
the following
Pearson reviewers: Chien-Chung Chan (University of Akron),
Zhengxin Chen
(University of Nebraska at Omaha), Chris Clifton (Purdue
University), Joy-
deep Ghosh (University of Texas, Austin), Nazli Goharian
(Illinois Institute
of Technology), J. Michael Hardin (University of Alabama),
James Hearne
(Western Washington University), Hillol Kargupta (University
of Maryland,
Baltimore County and Agnik, LLC), Eamonn Keogh (University
of California-
Riverside), Bing Liu (University of Illinois at Chicago),
Mariofanna Milanova
(University of Arkansas at Little Rock), Srinivasan
Parthasarathy (Ohio State
University), Zbigniew W. Ras (University of North Carolina at
Charlotte),
Xintao Wu (University of North Carolina at Charlotte), and
Mohammed J.
Zaki (Rensselaer Polvtechnic Institute).
Gontents
Preface
Introduction 1
1.1 What Is Data Mining? 2
17. 7.2 Motivating Challenges 4
1.3 The Origins of Data Mining 6
1.4 Data Mining Tasks 7
1.5 Scope and Organization of the Book 11
1.6 Bibliographic Notes 13
v l l
t.7 Exercises
Data
1 6
1 9
2.I Types of Data 22
2.1.I Attributes and Measurement 23
2.L.2 Types of Data Sets . 29
2.2 Data Quality 36
2.2.I Measurement and Data Collection Issues 37
2.2.2 Issues Related to Applications
2.3 Data Preprocessing
2.3.L Aggregation
2.3.2 Sampling
2.3.3 Dimensionality Reduction
2.3.4 Feature Subset Selection
2.3.5 Feature Creation
2.3.6 Discretization and Binarization
2.3:7 Variable Tlansformation .
2.4 Measures of Similarity and Dissimilarity . . .
2.4.L Basics
2.4.2 Similarity and Dissimilarity between Simple Attributes .
18. 2.4.3 Dissimilarities between Data Objects .
2.4.4 Similarities between Data Objects
43
44
45
47
50
5 2
5 5
5 7
63
6 5
66
6 7
6 9
72
xiv Contents
2.4.5 Examples of Proximity Measures
2.4.6 Issues in Proximity Calculation
2.4.7 Selecting the Right Proximity Measure
2.5 BibliographicNotes
2.6 Exercises
Exploring Data
3.i The Iris Data Set
3.2 Summary Statistics
3.2.L Frequencies and the Mode
3.2.2 Percentiles
3.2.3 Measures of Location: Mean and Median
19. 3.2.4 Measures of Spread: Range and Variance
3.2.5 Multivariate Summary Statistics
3.2.6 Other Ways to Summarize the Data
3.3 Visualization
3.3.1 Motivations for Visualization
3.3.2 General Concepts
3.3.3 Techniques
3.3.4 Visualizing Higher-Dimensional Data .
3.3.5 Do's and Don'ts
3.4 OLAP and Multidimensional Data Analysis
3.4.I Representing Iris Data as a Multidimensional Array
3.4.2 Multidimensional Data: The General Case .
3.4.3 Analyzing Multidimensional Data
3.4.4 Final Comments on Multidimensional Data Analysis
Bibliographic Notes
Exercises
Classification:
Basic Concepts, Decision Tlees, and Model Evaluation
4.1 Preliminaries
4.2 General Approach to Solving a Classification Problem
4.3 Decision Tlee Induction
4.3.1 How a Decision Tlee Works
4.3.2 How to Build a Decision TYee
4.3.3 Methods for Expressing Attribute Test Conditions
4.3.4 Measures for Selecting the Best Split .
4.3.5 Algorithm for Decision Tlee Induction
4.3.6 An Examole: Web Robot Detection
3 . 5
3 . 6
73
21. 1 5 8
164
1 6 6
Contents xv
4.3.7 Characteristics of Decision Tlee Induction
4.4 Model Overfitting
4.4.L Overfitting Due to Presence of Noise
4.4.2 Overfitting Due to Lack of Representative Samples
4.4.3 Overfitting and the Multiple Comparison Procedure
4.4.4 Estimation of Generalization Errors
4.4.5 Handling Overfitting in Decision Tlee Induction
4.5 Evaluating the Performance of a Classifier
4.5.I Holdout Method
4.5.2 Random Subsampling . . .
4.5.3 Cross-Validation
4.5.4 Bootstrap
4.6 Methods for Comparing Classifiers
4.6.L Estimating a Confidence Interval for Accuracy
4.6.2 Comparing the Performance of Two Models .
4.6.3 Comparing the Performance of Two Classifiers
4.7 BibliographicNotes
4.8 Exercises
5 Classification: Alternative Techniques
5.1 Rule-Based Classifier
5.1.1 How a Rule-Based Classifier Works
5.1.2 Rule-Ordering Schemes
22. 5.1.3 How to Build a Rule-Based Classifier
5.1.4 Direct Methods for Rule Extraction
5.1.5 Indirect Methods for Rule Extraction
5.1.6 Characteristics of Rule-Based Classifiers
5.2 Nearest-Neighbor classifiers
5.2.L Algorithm
5.2.2 Characteristics of Nearest-Neighbor Classifiers
5.3 Bayesian Classifiers
5.3.1 Bayes Theorem
5.3.2 Using the Bayes Theorem for Classification
5.3.3 Naive Bayes Classifier
5.3.4 Bayes Error Rate
5.3.5 Bayesian Belief Networks
5.4 Artificial Neural Network (ANN)
5.4.I Perceptron
5.4.2 Multilayer Artificial Neural Network
5.4.3 Characteristics of ANN
1 6 8
1 7 2
L75
L 7 7
178
179
184
186
1 8 6
1 8 7
1 8 7
1 8 8
1 8 8
1 8 9
1 9 1
23. 192
193
1 9 8
207
207
209
2 I I
2r2
2r3
2 2 L
223
223
225
226
227
228
229
23L
238
240
246
247
25r
255
xvi Contents
5.5 Support Vector Machine (SVM)
5.5.1 Maximum Margin Hyperplanes
5.5.2 Linear SVM: Separable Case
5.5.3 Linear SVM: Nonseparable Case
5.5.4 Nonlinear SVM .
5.5.5 Characteristics of SVM
24. Ensemble Methods
5.6.1 Rationale for Ensemble Method
5.6.2 Methods for Constructing an Ensemble Classifier
5.6.3 Bias-Variance Decomposition
5.6.4 Bagging
5.6.5 Boosting
5.6.6 Random Forests
5.6.7 Empirical Comparison among Ensemble Methods
Class Imbalance Problem
5.7.1 Alternative Metrics
5.7.2 The Receiver Operating Characteristic Curve
5.7.3 Cost-Sensitive Learning . .
5.7.4 Sampling-Based Approaches .
Multiclass Problem
Bibliographic Notes
Exercises
5 . 6
o . t
256
256
259
266
270
276
276
277
278
28r
2 8 3
285
290
294
294
25. 295
298
302
305
306
309
3 1 5
c . 6
5 . 9
5 . 1 0
Association Analysis: Basic Concepts and Algorithms 327
6.1 Problem Definition . 328
6.2 Flequent Itemset Generation 332
6.2.I The Apri,ori Principle 333
6.2.2 Fbequent Itemset Generation in the Apri,ori, Algorithm .
335
6.2.3 Candidate Generation and Pruning . . . 338
6.2.4 Support Counting 342
6.2.5 Computational Complexity 345
6.3 Rule Generatiorr 349
6.3.1 Confidence-Based Pruning 350
6.3.2 Rule Generation in Apri,ori, Algorithm 350
6.3.3 An Example: Congressional Voting Records 352
6.4 Compact Representation of Fbequent Itemsets 353
6.4.7 Maximal Flequent Itemsets 354
6.4.2 Closed Frequent Itemsets 355
6.5 Alternative Methods for Generating Frequent Itemsets 359
6.6 FP-Growth Alsorithm 363
26. Contents xvii
6.6.1 FP-tee Representation
6.6.2 Frequent Itemset Generation in FP-Growth Algorithm .
6.7 Evaluation of Association Patterns
6.7.l Objective Measures of Interestingness
6.7.2 Measures beyond Pairs of Binary Variables
6.7.3 Simpson's Paradox
6.8 Effect of Skewed Support Distribution
6.9 Bibliographic Notes
363
366
370
37r
382
384
386
390
404
4L5
415
4t8
4 1 8
422
424
426
429
429
431
436
31. 8.6 Bibliograph
8.7 Exercises
ic Notes
Cluster Analysis: Additional Issues and Algorithms 569
9.1 Characteristics of Data, Clusters, and Clustering Algorithms
. 570
9.1.1 Example: Comparing K-means and DBSCAN . . . . . . 570
9.1.2 Data Characteristics 577
Contents xix
9.1.3 Cluster Characteristics . . 573
9.L.4 General Characteristics of Clustering Algorithms 575
9.2 Prototype-Based Clustering 577
9.2.1 Fzzy Clustering 577
9.2.2 Clustering Using Mixture Models 583
9.2.3 Self-Organizing Maps (SOM) 594
9.3 Density-Based Clustering 600
9.3.1 Grid-Based Clustering 601
9.3.2 Subspace Clustering 604
9.3.3 DENCLUE: A Kernel-Based Scheme for Density-Based
Clustering 608
9.4 Graph-Based Clustering 612
9.4.1 Sparsification 613
9.4.2 Minimum Spanning Tlee (MST) Clustering . . . 674
9.4.3 OPOSSUM: Optimal Partitioning of Sparse Similarities
32. Using METIS 616
9.4.4 Chameleon: Hierarchical Clustering with Dynamic
Modeling
9.4.5 Shared Nearest Neighbor Similarity
9.4.6 The Jarvis-Patrick Clustering Algorithm
9.4.7 SNN Density
9.4.8 SNN Density-Based Clustering
9.5 Scalable Clustering Algorithms
9.5.1 Scalability: General Issues and Approaches
9 . 5 . 2 B I R C H
9.5.3 CURE
9.6 Which Clustering Algorithm?
9.7 Bibliographic Notes
9.8 Exercises
6 1 6
622
625
627
629
630
630
633
635
639
643
647
10 Anomaly Detection 651
10.1 Preliminaries 653
10.1.1 Causes of Anomalies 653
10.1.2 Approaches to Anomaly Detection 654
33. 10.1.3 The Use of Class Labels 655
1 0 . 1 . 4 I s s u e s 6 5 6
10.2 Statistical Approaches 658
t0.2.7 Detecting Outliers in a Univariate Normal Distribution
659
1 0 . 2 . 2 O u t l i e r s i n a M u l t i v a r i a t e N o r m a l D
i s t r i b u t i o n . . . . . 6 6 1
10.2.3 A Mixture Model Approach for Anomaly Detection. 662
xx Contents
10.2.4 Strengths and Weaknesses
10.3 Proximity-Based Outlier Detection
10.3.1 Strengths and Weaknesses
10.4 Density-Based Outlier Detection
10.4.1 Detection of Outliers Using Relative Density
70.4.2 Strengths and Weaknesses
10.5 Clustering-Based Techniques
10.5.1 Assessing the Extent to Which an Object Belongs to a
Cluster
10.5.2 Impact of Outliers on the Initial Clustering
10.5.3 The Number of Clusters to Use
10.5.4 Strengths and Weaknesses
665
666
666
668
669
34. 670
67L
672
674
674
674
675
680
6 8 5
b6i)
10.6 Bibliograph
10.7 Exercises
ic Notes
Appendix A Linear Algebra
A.1 Vectors
A.1.1 Definition 685
4.I.2 Vector Addition and Multiplication by a Scalar 685
A.1.3 Vector Spaces 687
4.7.4 The Dot Product, Orthogonality, and Orthogonal
Projections 688
A.1.5 Vectors and Data Analysis 690
42 Matrices 691
A.2.1 Matrices: Definitions 691
A-2.2 Matrices: Addition and Multiplicatio n by a Scalar 692
4.2.3 Matrices: Multiplication 693
4.2.4 Linear tansformations and Inverse Matrices 695
4.2.5 Eigenvalue and Singular Value Decomposition . 697
4.2.6 Matrices and Data Analysis 699
35. A.3 Bibliographic Notes 700
Appendix B Dimensionality Reduction 7OL
8.1 PCA and SVD 70I
B.1.1 Principal Components Analysis (PCA) 70L
8 . 7 . 2 S V D . 7 0 6
8.2 Other Dimensionality Reduction Techniques 708
8.2.I Factor Analysis 708
8.2.2 Locally Linear Embedding (LLE) . 770
8.2.3 Multidimensional Scaling, FastMap, and ISOMAP 7I2
Contents xxi
8.2.4 Common Issues
B.3 Bibliographic Notes
Appendix C Probability and Statistics
C.1 Probability
C.1.1 Expected Values
C.2 Statistics
C.2.L Point Estimation
C.2.2 Central Limit Theorem
C.2.3 Interval Estimation
C.3 Hypothesis Testing
Appendix D Regression
D.1 Preliminaries
D.2 Simple Linear Regression
36. D.2.L Least Square Method
D.2.2 Analyzing Regression Errors
D.2.3 Analyzing Goodness of Fit
D.3 Multivariate Linear Regression
D.4 Alternative Least-Square Regression Methods
Appendix E Optimization
E.1 Unconstrained Optimizafion
E.1.1 Numerical Methods
8.2 Constrained Optimization
E.2.I Equality Constraints
8.2.2 Inequality Constraints
Author Index
Subject Index
Copyright Permissions
715
7L6
7L9
7L9
722
723
724
724
725
726
739
38. size of a data
set. Sometimes, the non-traditional nature of the data means that
traditional
approaches cannot be applied even if the data set is relatively
small. In other
situations, the questions that need to be answered cannot be
addressed using
existing data analysis techniques, and thus, new methods need
to be devel-
oped.
Data mining is a technology that blends traditional data analysis
methods
with sophisticated algorithms for processing large volumes of
data. It has also
opened up exciting opportunities for exploring and analyzing
new types of
data and for analyzing old types of data in new ways. In this
introductory
chapter, we present an overview of data mining and outline the
key topics
to be covered in this book. We start with a description of some
well-known
applications that require new techniques for data analysis.
Business Point-of-sale data collection (bar code scanners, radio
frequency
identification (RFID), and smart card technology) have allowed
retailers to
collect up-to-the-minute data about customer purchases at the
checkout coun-
ters of their stores. Retailers can utilize this informa tion, along
with other
business-critical data such as Web logs from e-commerce Web
sites and cus-
tomer service records from call centers, to help them better
39. understand the
needs of their customers and make more informed business
decisions.
Data mining techniques can be used to support a wide range of
business
intelligence applications such as customer profiling, targeted
marketing, work-
flow management, store layout, and fraud detection. It can also
help retailers
2 Chapter 1 lntroduction
answer important business questions such as "Who are the most
profitable
customers?" "What products can be cross-sold or up-sold?" and
"What is the
revenue outlook of the company for next year?)) Some of these
questions mo-
tivated the creation of association analvsis (Chapters 6 and 7), a
new data
analysis technique.
Medicine, Science, and Engineering Researchers in medicine,
science,
and engineering are rapidly accumulating data that is key to
important new
discoveries. For example, as an important step toward
improving our under-
standing of the Earth's climate system, NASA has deployed a
series of Earth-
orbiting satellites that continuously generate global
observations of the Iand
surface, oceans, and atmosphere. However, because of the size
40. and spatio-
temporal nature of the data, traditional methods are often not
suitable for
analyzing these data sets. Techniques developed in data mining
can aid Earth
scientists in answering questions such as "What is the
relationship between
the frequency and intensity of ecosystem disturbances such as
droughts and
hurricanes to global warming?" "How is land surface
precipitation and temper-
ature affected by ocean surface temperature?" and "How well
can we predict
the beginning and end of the growing season for a region?"
As another example, researchers in molecular biology hope to
use the large
amounts of genomic data currently being gathered to better
understand the
structure and function of genes. In the past, traditional methods
in molecu-
lar biology allowed scientists to study only a few genes at a
time in a given
experiment. Recent breakthroughs in microarray technology
have enabled sci-
entists to compare the behavior of thousands of genes under
various situations.
Such comparisons can help determine the function of each gene
and perhaps
isolate the genes responsible for certain diseases. However, the
noisy and high-
dimensional nature of data requires new types of data analysis.
In addition
to analyzing gene array data, data mining can also be used to
address other
important biological challenges such as protein structure
41. prediction, multiple
sequence alignment, the modeling of biochemical pathways, and
phylogenetics.
1.1 What Is Data Mining?
Data mining is the process of automatically discovering useful
information in
large data repositories. Data mining techniques are deployed to
scour large
databases in order to find novel and useful patterns that might
otherwise
remain unknown. They also provide capabilities to predict the
outcome of a
1.1 What Is Data Mining? 3
future observation, such as predicting whether a newly arrived.
customer will
spend more than $100 at a department store.
Not all information discovery tasks are considered to be data
mining. For
example, Iooking up individual records using a database
managemenr sysrem
or finding particular Web pages via a query to an Internet
search engine are
tasks related to the area of information retrieval. Although such
tasks are
important and may involve the use of the sophisticated
algorithms and data
structures, they rely on traditional computer science techniques
and obvious
features of the data to create index structures for efficiently
42. organizing and
retrieving information. Nonetheless, data mining techniques
have been used
to enhance information retrieval systems.
Data Mining and Knowledge Discovery
Data mining is an integral part of knowledge discovery in
databases
(KDD), which is the overall process of converting raw data into
useful in-
formation, as shown in Figure 1.1. This process consists of a
series of trans-
formation steps, from data preprocessing to postprocessing of
data mining
results.
Information
Figure 1 ,1. The process of knowledge discovery in databases
(KDD).
The input data can be stored in a variety of formats (flat files,
spread-
sheets, or relational tables) and may reside in a centralized data
repository
or be distributed across multiple sites. The purpose of
preprocessing is
to transform the raw input data into an appropriate format for
subsequent
analysis. The steps involved in data preprocessing include
fusing data from
multiple sources, cleaning data to remove noise and duplicate
observations,
and selecting records and features that are relevant to the data
mining task
43. at hand. Because of the many ways data can be collected and
stored, data
4 Chapter 1 Introduction
preprocessing is perhaps the most laborious and time-consuming
step in the
overall knowledge discovery process.
,,Closing the loop" is the phrase often used to refer to the
process of in-
tegrating data mining results into decision support systems. For
example,
in business applications, the insights offered by data mining
results can be
integrated with campaign management tools so that effective
marketing pro-
motions can be conducted and tested. Such integration requires
a postpro-
cessing step that ensures that only valid and useful results are
incorporated
into the decision support system. An example of postprocessing
is visualiza-
tion (see Chapter 3), which allows analysts to explore the data
and the data
mining results from a variety of viewpoints. Statistical measures
44. or hypoth-
esis testing methods can also be applied during postprocessing
to eliminate
spurious data mining results.
L.2 Motivating Challenges
As mentioned earlier, traditional data analysis techniques have
often encoun-
tered practical difficulties in meeting the challenges posed by
new data sets.
The following are some of the specific challenges that
motivated the develop-
ment of data mining.
Scalability Because of advances in data generation and
collection, data sets
with sizes of gigabytes, terabytes, or even petabytes are
becoming common.
If data mining algorithms are to handle these massive data sets,
then they
must be scalable. Many data mining algorithms employ special
search strate-
gies to handle exponential search problems. Scalability may
also require the
implementation of novel data structures to access individual
45. records in an ef-
ficient manner. For instance, out-of-core algorithms may be
necessary when
processing data sets that cannot fit into main memory.
Scalability can also be
improved by using sampling or developing parallel and
distributed algorithms.
High Dimensionality It is now common to encounter data sets
with hun-
dreds or thousands of attributes instead of the handful common
a few decades
ago. In bioinformatics, progress in microarray technology has
produced gene
expression data involving thousands of features. Data sets with
temporal
or spatial components also tend to have high dimensionality.
For example,
consider a data set that contains measurements of temperature at
various
locations. If the temperature measurements are taken repeatedly
for an ex-
tended period, the number of dimensions (features) increases in
proportion to
46. L.2 Motivating Challenges 5
the number of measurements taken. Tladitional data analysis
techniques that
were developed for low-dimensional data often do not work
well for such high-
dimensional data. Also, for some data analysis algorithms, the
computational
complexity increases rapidly as the dimensionality (the number
of features)
increases.
Heterogeneous and Complex Data TYaditional data analysis
methods
often deal with data sets containing attributes of the same type,
either contin-
uous or categorical. As the role of data mining in business,
science, medicine,
and other flelds has grown, so has the need for techniques that
can handle
heterogeneous attributes. Recent years have also seen the
emergence of more
complex data objects. Examples of such non-traditional types of
data include
collections of Web pages containing semi-structured text and
hyperlinks; DNA
data with sequential and three-dimensional structure; and
climate data that
consists of time series measurements (temperature, pressure,
etc.) at various
locations on the Earth's surface. Techniques developed for
mining such com-
plex objects should take into consideration relationships in the
data, such as
temporal and spatial autocorrelation, graph connectivity, and
47. parent-child re-
lationships between the elements in semi-structured text and
XML documents.
Data ownership and Distribution Sometimes, the data needed for
an
analysis is not stored in one location or owned by one
organization. Instead,
the data is geographically distributed among resources
belonging to multiple
entities. This requires the development of distributed data
mining techniques.
Among the key challenges faced by distributed data mining
algorithms in-
clude (1) how to reduce the amount of communication needed to
perform the
distributed computatior, (2) how to effectively consolidate the
data mining
results obtained from multiple sources, and (3) how to address
data security
issues.
Non-traditional Analysis The traditional statistical approach is
based on
a hypothesize-and-test paradigm. In other words, a hypothesis is
proposed,
an experiment is designed to gather the data, and then the data
is analyzed
with respect to the hypothesis. Unfortunately, this process is
extremely labor-
intensive. Current data analysis tasks often require the
generation and evalu-
ation of thousands of hypotheses, and consequently, the
development of some
data mining techniques has been motivated by the desire to
automate the
48. process of hypothesis generation and evaluation. Furthermore,
the data sets
analyzed in data mining are typically not the result of a
carefully designed
6 Chapter 1 Introduction
experiment and often represent opportunistic samples of the
data, rather than
random samples. Also, the data sets frequently involve non-
traditional types
of data and data distributions.
1.3 The Origins of Data Mining
Brought together by the goal of meeting the challenges of the
previous sec-
tion, researchers from different disciplines began to focus on
developing more
efficient and scalable tools that could handle diverse types of
data. This work,
which culminated in the field of data mining, built upon the
methodology and
algorithms that researchers had previously used. In particular,
data mining
draws upon ideas, such as (1) sampling, estimation, and
hypothesis testing
49. from statistics and (2) search algorithms, modeling techniques,
and learning
theories from artificial intelligence, pattern recognition, and
machine learning.
Data mining has also been quick to adopt ideas from other
areas, including
optimization, evolutionary computing, information theory,
signal processing,
visualization, and information retrieval.
A number of other areas also play key supporting roles. In
particular,
database systems are needed to provide support for efficient
storage, index-
ing, and query processing. Techniques from high performance
(parallel) com-
puting are often important in addressing the massive size of
some data sets.
Distributed techniques can also help address the issue of size
and are essential
when the data cannot be gathered in one location.
Figure 1.2 shows the relationship of data mining to other areas.
Figure 1.2. Data mining as a conlluence of many disciplines.
50. Data Mining Tasks 7
1.4 Data Mining Tasks
Data mining tasks are generally divided into two major
categories:
Predictive tasks. The objective of these tasks is to predict the
value of a par-
ticular attribute based on the values of other attributes. The
attribute
to be predicted is commonly known as the target or dependent
vari-
able, while the attributes used for making the prediction are
known as
the explanatory or independent variables.
Descriptive tasks. Here, the objective is to derive patterns
(correlations,
trends, clusters, trajectories, and anomalies) that summarize the
un-
derlying relationships in data. Descriptive data mining tasks are
often
exploratory in nature and frequently require postprocessing
techniques
to validate and explain the results.
Figure 1.3 illustrates four of the core data mining tasks that are
described
in the remainder of this book.
Four of the core data mining tasks.
L . 4
I
51. Figure 1.3.
8 Chapter 1 Introduction
Predictive modeling refers to the task of building a model for
the target
variable as a function of the explanatory variables. There are
two types of
predictive modeling tasks: classification, which is used for
discrete target
variables, and regression, which is used for continuous target
variables. For
example, predicting whether a Web user will make a purchase at
an online
bookstore is a classification task because the target variable is
binary-valued.
On the other hand, forecasting the future price of a stock is a
regression task
because price is a continuous-valued attribute. The goal of both
tasks is to
learn a model that minimi zes the error between the predicted
and true values
of the target variable. Predictive modeling can be used to
identify customers
52. that will respond to a marketing campaign, predict disturbances
in the Earth's
ecosystem, or judge whether a patient has a particular disease
based on the
results of medical tests.
Example 1.1 (Predicting the Type of a Flower). Consider the
task of
predicting a species of flower based on the characteristics of the
flower. In
particular, consider classifying an Iris flower as to whether it
belongs to one
of the following three Iris species: Setosa, Versicolour, or
Virginica. To per-
form this task, we need a data set containing the characteristics
of various
flowers of these three species. A data set with this type of
information is
the well-known Iris data set from the UCI Machine Learning
Repository at
http: /hrurw.ics.uci.edu/-mlearn. In addition to the species of a
flower,
this data set contains four other attributes: sepal width, sepal
length, petal
53. length, and petal width. (The Iris data set and its attributes are
described
further in Section 3.1.) Figure 1.4 shows a plot of petal width
versus petal
length for the 150 flowers in the Iris data set. Petal width is
broken into the
categories low, med'ium, and hi'gh, which correspond to the
intervals [0' 0.75),
[0.75, 1.75), [1.75, oo), respectively. Also, petal length is
broken into categories
low, med,'ium, and hi,gh, which correspond to the intervals [0'
2.5), [2.5,5), [5'
oo), respectively. Based on these categories of petal width and
length, the
following rules can be derived:
Petal width low and petal length low implies Setosa.
Petal width medium and petal length medium implies
Versicolour.
Petal width high and petal length high implies Virginica.
While these rules do not classify all the flowers, they do a good
(but not
perfect) job of classifying most of the flowers. Note that
flowers from the
Setosa species are well separated from the Versicolour and
Virginica species
54. with respect to petal width and length, but the latter two species
overlap
somewhat with respect to these attributes. I
r Setosa
. Versicolour
o Virginica
L.4 Data Mining Tasks I
l - - - - a - - f o - - - - - - - i
l a o r
, f t f o o t o a i
: o o o I
I
' t 0 f 0 a o
0?oo r a
a r f I
? 1 . 7 5
E()
r 1 . 5
E
=
(t'
()
( L l
!0_l! _.! o_ _o. t
a a r O
55. . .4. a?o
o a a a a
a aaaaaaa
a a a a a
aa
a a a a a
I
I
l l t l l
l l t I
I l l l l t t I
I t !
1 2 2 . 5 3 4 5 (
Petal Length (cm)
Figure 1.4. Petal width versus petal length for 1 50 lris flowers,
Association analysis is used to discover patterns that describe
strongly as-
sociated features in the data. The discovered patterns are
typically represented
in the form of implication rules or feature subsets. Because of
the exponential
size of its search space, the goal of association analysis is to
extract the most
interesting patterns in an efficient manner. Useful applications
56. of association
analysis include finding groups of genes that have related
functionality, identi-
fying Web pages that are accessed together, or understanding
the relationships
between different elements of Earth's climate system.
Example 1.2 (Market Basket Analysis). The transactions shown
in Ta-
ble 1.1 illustrate point-of-sale data collected at the checkout
counters of a
grocery store. Association analysis can be applied to find items
that are fre-
quently bought together by customers. For example, we may
discover the
rule {Diapers} -----* {lt:.ft}, which suggests that customers
who buy diapers
also tend to buy milk. This type of rule can be used to identify
potential
cross-selling opportunities among related items. I
Cluster analysis seeks to find groups of closely related
observations so that
observations that belong to the same cluster are more similar to
each other
10 Chapter 1 Introduction
Table 1 .1. Market basket data.
Tlansaction ID Items
1
2
3
57. 4
r
o
7
8
9
1 0
{Bread, Butter, Diapers, Milk}
{Coffee, Sugar, Cookies, Sakoon}
{Bread, Butter, Coffee, Diapers, Milk, Eggs}
{Bread, Butter, Salmon, Chicken}
{fgg", Bread, Butter}
{Salmon, Diapers, Milk}
{Bread, Tea, Sugar, Eggs}
{Coffee, Sugar, Chicken, Eggs}
{Bread, Diapers, Mi1k, Salt}
{Tea, Eggs, Cookies, Diapers, Milk}
than observations that belong to other clusters. Clustering has
been used to
group sets of related customers, find areas of the ocean that
have a significant
impact on the Earth's climate, and compress data.
58. Example 1.3 (Document Clustering). The collection of news
articles
shown in Table 1.2 can be grouped based on their respective
topics. Each
article is represented as a set of word-frequency pairs (r,
"),
where tu is a word
and c is the number of times the word appears in the article.
There are two
natural clusters in the data set. The first cluster consists of the
first four ar-
ticles, which correspond to news about the economy, while the
second cluster
contains the last four articles, which correspond to news about
health care. A
good clustering algorithm should be able to identify these two
clusters based
on the similarity between words that appear in the articles.
Table 1.2. Collection of news articles.
Article Words
I
2
.)
A
59. r
J
o
7
8
dollar: 1, industry: 4, country: 2, loan: 3, deal: 2, government: 2
machinery: 2, labor: 3, market: 4, industry: 2, work: 3, country:
1
job: 5, inflation: 3, rise: 2, jobless: 2, market: 3, country: 2,
index: 3
domestic: 3, forecast: 2, gain: 1, market: 2, sale: 3, price: 2
patient: 4, symptom: 2, drug: 3, health: 2, clinic: 2, doctor: 2
pharmaceutical:2, company: 3, drug: 2,vaccine:1, flu: 3
death: 2, cancer: 4, drug: 3, public: 4, health: 3, director: 2
medical: 2, cost: 3, increase: 2, patient: 2, health: 3, care: 1
1.5 Scope and Organization of the Book 11
Anomaly detection is the task of identifying observations whose
character-
istics are significantly different from the rest of the data. Such
observations
are known as anomalies or outliers. The goal of an anomaly
detection al-
gorithm is to discover the real anomalies and avoid falsely
labeling normal
60. objects as anomalous. In other words, a good anomaly detector
must have
a high detection rate and a low false alarm rate. Applications of
anomaly
detection include the detection of fraud, network intrusions,
unusual patterns
of disease, and ecosystem disturbances.
Example 1.4 (Credit Card trYaud Detection). A credit card
company
records the transactions made by every credit card holder, along
with personal
information such as credit limit, age, annual income, and
address. since the
number of fraudulent cases is relatively small compared to the
number of
legitimate transactions, anomaly detection techniques can be
applied to build
a profile of legitimate transactions for the users. When a new
transaction
arrives, it is compared against the profile of the user. If the
characteristics of
the transaction are very different from the previously created
profile, then the
transaction is flagged as potentially fraudulent. I
1.5 Scope and Organization of the Book
This book introduces the major principles and techniques used
in data mining
from an algorithmic perspective. A study of these principles and
techniques is
essential for developing a better understanding of how data
mining technology
can be applied to various kinds of data. This book also serves as
a starting
61. point for readers who are interested in doing research in this
field.
We begin the technical discussion of this book with a chapter on
data
(Chapter 2), which discusses the basic types of data, data
quality, prepro-
cessing techniques, and measures of similarity and dissimilarity.
Although
this material can be covered quickly, it provides an essential
foundation for
data analysis. Chapter 3, on data exploration, discusses
summary statistics,
visualization techniques, and On-Line Analytical Processing
(OLAP). These
techniques provide the means for quickly gaining insight into a
data set.
Chapters 4 and 5 cover classification. Chapter 4 provides a
foundation
by discussing decision tree classifiers and several issues that
are important
to all classification: overfitting, performance evaluation, and
the comparison
of different classification models. Using this foundation,
Chapter 5 describes
a number of other important classification techniques: rule-
based systems,
nearest-neighbor classifiers, Bayesian classifiers, artificial
neural networks, sup-
port vector machines, and ensemble classifiers, which are
collections of classi-
!2 Chapter 1 lntroduction
62. fiers. The multiclass and imbalanced class problems are also
discussed. These
topics can be covered independently.
Association analysis is explored in Chapters 6 and 7. Chapter 6
describes
the basics of association analysis: frequent itemsets, association
rules, and
some of the algorithms used to generate them. Specific types of
frequent
itemsets-maximal, closed, and hyperclique-that are important
for data min-
ing are also discussed, and the chapter concludes with a
discussion of evalua-
tion measures for association analysis. Chapter 7 considers a
variety of more
advanced topics, including how association analysis can be
applied to categor-
ical and continuous data or to data that has a concept hierarchy.
(A concept
hierarchy is a hierarchical categorization of objects, e.g., store
items, clothing,
shoes, sneakers.) This chapter also describes how association
analysis can be
extended to find sequential patterns (patterns involving order),
63. patterns in
graphs, and negative relationships (if one item is present, then
the other is
n o t ) .
Cluster analysis is discussed in Chapters 8 and 9. Chapter 8 first
describes
the different types of clusters and then presents three specific
clustering tech-
niques: K-means, agglomerative hierarchical clustering, and
DBSCAN. This
is followed by a discussion of techniques for validating the
results of a cluster-
ing algorithm. Additional clustering concepts and techniques
are explored in
Chapter 9, including fiszzy and probabilistic clustering, Self-
Organizing Maps
(SOM), graph-based clustering, and density-based clustering.
There is also a
discussion of scalability issues and factors to consider when
selecting a clus-
tering algorithm.
The last chapter, Chapter 10, is on anomaly detection. After
some basic
definitions, several different types of anomaly detection are
considered: sta-
64. tistical, distance-based, density-based, and clustering-based.
Appendices A
through E give a brief review of important topics that are used
in portions of
the book: linear algebra, dimensionality reduction, statistics,
regression, and
optimization.
The subject of data mining, while relatively young compared to
statistics
or machine learning, is already too large to cover in a single
book. Selected
references to topics that are only briefly covered, such as data
quality' are
provided in the bibliographic notes of the appropriate chapter.
References to
topics not covered in this book, such as data mining for streams
and privacy-
preserving data mining, are provided in the bibliographic notes
of this chapter.
Bibliographic Notes 13
1.6 Bibliographic Notes
The topic of data mining has inspired many textbooks.
65. Introductory text-
books include those by Dunham [10], Han and Kamber l2L),
Hand et al. [23],
and Roiger and Geatz [36]. Data mining books with a stronger
emphasis on
business applications include the works by Berry and Linoff [2],
Pyle [34], and
Parr Rud [33]. Books with an emphasis on statistical learning
include those
by Cherkassky and Mulier [6], and Hastie et al. 124]. Some
books with an
emphasis on machine learning or pattern recognition are those
by Duda et
al. [9], Kantardzic [25], Mitchell [31], Webb [41], and Witten
and F]ank [42].
There are also some more specialized books: Chakrabarti [a]
(web mining),
Fayyad et al. [13] (collection of early articles on data mining),
Fayyad et al.
111] (visualization), Grossman et al. [18] (science and
engineering), Kargupta
and Chan [26] (distributed data mining), Wang et al. [a0]
(bioinformatics),
and Zaki and Ho [44] (parallel data mining).
There are several conferences related to data mining. Some of
the main
conferences dedicated to this field include the ACM SIGKDD
International
Conference on Knowledge Discovery and Data Mining (KDD),
the IEEE In-
ternational Conference on Data Mining (ICDM), the SIAM
International Con-
ference on Data Mining (SDM), the European Conference on
Principles and
66. Practice of Knowledge Discovery in Databases (PKDD), and the
Pacific-Asia
Conference on Knowledge Discovery and Data Mining
(PAKDD). Data min-
ing papers can also be found in other major conferences such as
the ACM
SIGMOD/PODS conference, the International Conference on
Very Large Data
Bases (VLDB), the Conference on Information and Knowledge
Management
(CIKM), the International Conference on Data Engineering
(ICDE), the In-
ternational Conference on Machine Learning (ICML), and the
National Con-
ference on Artificial Intelligence (AAAI).
Journal publications on data mining include IEEE Transact'ions
on Knowl-
edge and Data Engi,neering, Data Mi,ning and Knowledge
Discouery, Knowl-
edge and Information Systems, Intelli,gent Data Analysi,s,
Inforrnati,on Sys-
tems, and lhe Journal of Intelligent Informati,on Systems.
There have been a number of general articles on data mining
that define the
field or its relationship to other fields, particularly statistics.
Fayyad et al. [12]
describe data mining and how it fits into the total knowledge
discovery process.
Chen et al. [5] give a database perspective on data mining.
Ramakrishnan
and Grama [35] provide a general discussion of data mining and
present several
viewpoints. Hand [22] describes how data mining differs from
statistics, as does
67. Fliedman lf 4]. Lambert [29] explores the use of statistics for
large data sets and
provides some comments on the respective roles of data mining
and statistics.
1_.6
L4 Chapter 1 Introduction
Glymour et al. 116] consider the lessons that statistics may have
for data
mining. Smyth et aL [38] describe how the evolution of data
mining is being
driven by new types of data and applications, such as those
involving streams,
graphs, and text. Emerging applications in data mining are
considered by Han
et al. [20] and Smyth [37] describes some research challenges in
data mining.
A discussion of how developments in data mining research can
be turned into
practical tools is given by Wu et al. [43]. Data mining standards
are the
subject of a paper by Grossman et al. [17]. Bradley [3]
discusses how data
mining algorithms can be scaled to large data sets.
68. With the emergence of new data mining applications have come
new chal-
lenges that need to be addressed. For instance, concerns about
privacy breaches
as a result of data mining have escalated in recent years,
particularly in ap-
plication domains such as Web commerce and health care. As a
result, there
is growing interest in developing data mining algorithms that
maintain user
privacy. Developing techniques for mining encrypted or
randomized data is
known as privacy-preserving data mining. Some general
references in this
area include papers by Agrawal and Srikant l1], Clifton et al .
[7] and Kargupta
et al. [27]. Vassilios et al. [39] provide a survey.
Recent years have witnessed a growing number of applications
that rapidly
generate continuous streams of data. Examples of stream data
include network
traffic, multimedia streams, and stock prices. Several issues
must be considered
when mining data streams, such as the limited amount of
memory available,
69. the need for online analysis, and the change of the data over
time. Data
mining for stream data has become an important area in data
mining. Some
selected publications are Domingos and Hulten [8]
(classification), Giannella
et al. [15] (association analysis), Guha et al. [19] (clustering),
Kifer et al. [28]
(change detection), Papadimitriou et al. [32] (time series), and
Law et al. [30]
(dimensionality reduction).
[1]
12l
l o l
[')]
[4]
Bibliography
R. Agrawal and R. Srikant. Privacy-preserving data mining. ln
Proc. of 2000 ACM-
SIGMOD IntI. Conf. on Management of Data, pages 439-450,
Dallas, Texas, 2000.
ACM Press.
M. J. A. Berry and G. Linofi. Data Mtni,ng Technr,ques: For
Marketing, Sales, and'
70. Customer Relati,onship Management. Wiley Computer
Publishing, 2nd edition, 2004.
P. S. Bradley, J. Gehrke, R. Ramakrishnan, and R. Srikant.
Scaling mining algorithms
to large databases. Communicati,ons of the ACM, 45(8):38
43,2002.
S. Chakrabarti. Mini.ng the Web: Di.scoueri.ng Knouledge from
Hypertert Data' Morgan
Kaufmann, San Flancisco, CA, 2003.
Bibliography 15
[5] M.-s. chen, J. Han, and P. s. Yu. Data Mining: An overview
from a Database
Perspective. IEEE Transact'ions on Knowled,ge abd Data
Engineering, g(6):g66-gg3,
1 9 9 6 .
[6] v. cherkassky and F. Mulier. Learn'ing from Data: concepts,
Theory, and, Method,s.
Wiley Interscience, 1g98.
[7] c. clifton, M. Kantarcioglu, and J. vaidya. Defining privacy
for data mining. In
National Sc'ience Foundat'ion workshop on Nert Generation
Data Mining, pages 126-
133, Baltimore, MD, November 2002.
f8] P' Domingos and G. Hulten. Mining high-speed data
71. streams. In Proc. of the 6th Intt.
conf. on Knowled,ge Discouery and Data M'in'ing, pages z1-80,
Boston, Massachusetts,
2000. ACM Press.
J9] R. o' Duda, P. E. Hart, and D. G. stork. Pattern
classification John wiley & sons,
Inc., New York, 2nd edition, 2001.
[10] M. H. Dunham. Data Mini,ng: Introd,uctory and,
Ad,uanced ropics. prentice Hall, 2002.
f11] U. M. Fayyad, G. G. Grinstein, and A. Wierse, editors.
Information Visualization in
Data Mining and, Knowled,ge Discouery. Morgan Kaufmann
Publishers, San Ftancisco,
CA, September 200I.
112] u. M. Fayyad, G. Piatetsky-Shapiro, and P. smyth. Fyom
Data Mining to Knowledge
Discovery: An overview. rn Ad,aances in Knowledge Discouery
and Data M'ining, pages
1-34. AAAI Press, 1996.
[13] u. M. Fayyad, G. Piatetsky-shapiro, P. Smyth, and R.
uthurusamy, editors. Aduances
'in Knowled,ge Discouery and Data Mini.ng. AAAI/MIT press,
1g96.
[14] J. H. Friedman. Data Mining and Statistics: What's the
Connection? Unpublished.
www-stat.stanford.edu/-jhf/ftp/dm-stat.ps, 1992.
[15] c. Giannella, J. Han, J. Pei, X. Yan, and P. s. Yu. Mining
Fyequent patterns in Data
streams at Multiple Time Granularities. In H. Kargupta, A.
72. Joshi, K. sivakumar, and
Y. Yesha, editors, Nert Generation Data M,ining, pages ISI-2I2.
AAAI/MIT,2003.
116] c. Glymour, D. Madigan, D. Pregibon, and P. smyth.
statistical rhemes and Lessons
for Data Mining. Data Mining and Knowleilge D,iscouerg,
1(1):11-28, 1992.
[17] R. L. Grossman, M. F. Hornick, and G. Meyer. Data mining
standards initiatives.
c omtnunications of the A c M, 45(g) :59-6I, 2002.
[18] R. L. Grossman, c. Kamath, P. Kegelmeyer, v. Kumar, and
R. Namburu, editors. Data
Mini;ng for Sci,entific and Engineering Applicati,ons. Kluwer
Academic Publishers, 2001.
119] s. Guha, A. Meyerson, N. Mishra, R. Motwani, and L.
o'callaghan. clustering Data
Streams: Theory and Practice. IEEE Tbansact'ions on
Knowledge and, Data Engineering,
15(3) :515-528, May/June 2003.
[20] J. Han, R. B. Altman, V. Kumar, H. Mannila, and D.
pregibon. Emerging scientific
applications in data mining. Communications of the ACM,
4S(8):54-b8,2002.
[21] J. Han and M. Kamber. Data Mining: concepts and,
Techniques. Morgan Kaufmann
Publishers, San Francisco, 2001.
[22] D. J. Hand. Data Mining: Statistics and More? The
American Statistician, 52(2):
1 1 2 - 1 1 8 , 1 9 9 8 .
73. [23] D. J. Hand, H. Mannila, and P. smyth. Principles of Data
Mining. MIT press, 2001.
l24l T. Hastie, R. Tibshirani, and J. H. Fliedman. The Elements
of Stati.stical Learning:
Data Mini,ng, Inference, Pred,iction. Springer, New York, 2001.
[25] M. Kantardzic. Data Mini,ng: concepts, Mod,el.s,
Method,s, and Algorithms. wiley-IEEE
Press, Piscataway NJ, 2003.
16 Chapter I Introduction
[26] H. Kargupta and P. K. Chan, editors. Aduances in
Di,stributed and Parallel Knowledge
Discouery. AAAI Press, September 2002.
l27l H. Kargupta, s. Datta, Q. wang, and K. sivakumar. on the
Privacy Preserving
Prop-
erties of Random Data Perturbation Techniques. In Proc. of the
2003 IEEE IntI. Conf.
on Data Mi,n'ing, pages 99 106, Melbourne, Florida, December
2003. IEEE Computer
Society.
f28] D. Kifer, s. Ben-David, and J. Gehrke. Detecting change in
Data streams. In
Proc. of
74. the 30th VLDB Conf., pages 180 191, Toronto, Canada,2004.
Morgan Kaufmann.
f29] D. Lambert. What Use is Statistics for Massive Data? In
ACM SIGMOD Workshop
on Research Issues in Data Mini'ng and Knowledge Di'scouery,
pages 54-62, 2000.
[30] M H. C. Law, N. Zhang, and A. K. Jain. Nonlinear
Manifold Learning for Data
Streams. In Proc. of the SIAM Intl. Conf. on Data Mi.ning,
Lake Buena Vista, Florida,
A p r i l 2 0 0 4 . S I A M .
[31] T. Mitchell. Mach'ine Learning. McGraw-Hill, Boston,
MA, 1997.
[32] S. Papadimitriou, A. Brockwell, and C. Faloutsos.
Adaptive, unsupervised stream
min-
ing. VLDB Journal, 13(3):222 239.2004.
f33l O. Parr Rud. Data Mi,ning Cookbook: Modeling Data for
Marleet'ing, Risk and, Customer
Relationship Management John Wiley & Sons, New York, NY,
2001.
[34] D. Pyle. Business Modeling and, Data Mining. Morgan
Kaufmann, san FYancisco, cA,
75. 2003.
135] N. Ramakrishnan and A. Grama. Data Mining: From
Serendipity to Science-Guest
Editors' Introduction. IEEE Computer, S2(8):34 37, 1999.
[36] R. Roiger and M. Geatz. Data Mzni,ng: A Tutorial Based,
Primer. Addison-Wesley,
2002.
137] P. Smyth. Breaking out of the Black-Box: Research
Challenges in Data Mining. In
Proc. of the 2001 ACM SIGMOD Workshop on Research Issues
i.n Data Mining and
Knowledg e Discouerg, 2OOL.
[38] P. Smyth, D. Pregibon, and C. Faloutsos. Data-driven
evolution of data mining algo-
rithms. Commun'ications of the ACM, 45(8):33-37, 2002.
[39] V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y.
Saygin, and Y. Theodoridis.
State-of-the-art in privacy preserving data mining. SIGMOD
Record,,33(1):50-57' 2004.
[40] J. T. L. Wang, M. J. Zaki, H. Toivonen, and D. tr. Shasha,
editors. Data Mining in
Bi,oi,nformatics. Springer, September 2004.
76. [41] A. R. Webb. Statistical Pattern Recogn'iti'on. John Wiley
& Sons, 2nd edition, 2002.
[42] I.H. Witten and E. Frank. Data Mini,ng: Practzcal Machine
Learn'ing Tools and Tech-
niques with Jaaa Implernentat'ions. Morgan Kaufmann, 1999.
[43] X. Wu, P. S. Yu, and G. Piatetsky-Shapiro. Data Mining:
How Research Meets Practical
Development ? Knowledg e and Inf ormati'on Sy stems, 5 (2)
:248-261, 2003.
l44l M. J. Zaki and C.-T. Ho, editors. Large-Scale Parallel Data
Mining. Springer, September
2002.
L.7 Exercises
1. Discuss whether or not each of the following activities is a
data mining task.
2 .
J .
L.7 Exercises L7
(a) Dividing the customers of a company according to their
gender.
(b) Dividing the customers of a company according to their
77. profitability.
(c) Computing the total sales of a company.
(d) Sorting a student database based on student identification
numbers.
(e) Predicting the outcomes of tossing a (fair) pair of dice.
(f) Predicting the future stock price of a company using
historical records.
(g) Monitoring the heart rate of a patient for abnormalities.
(h) Monitoring seismic waves for earthquake activities.
(i) Extracting the frequencies of a sound wave.
Suppose that you are employed as a data mining consultant for
an Internet
search engine company. Describe how data mining can help the
company by
giving specific examples of how techniques, such as clustering,
classification,
association rule mining, and anomaly detection can be applied.
For each of the following data sets, explain whether or not data
privacy is an
important issue.
(a) Census data collected from 1900-1950.
(b) IP addresses and visit times of Web users who visit your
Website.
(c) Images from Earth-orbiting satellites.
78. (d) Names and addresses of people from the telephone book.
(e) Names and email addresses collected from the Web.
Data
This chapter discusses several data-related issues that are
important for suc-
cessful data mining:
The Type of Data Data sets differ in a number of ways. For
example, the
attributes used to describe data objects can be of different
types-quantitative
or qualitative-and data sets may have special characteristics;
e.g., some data
sets contain time series or objects with explicit relationships to
one another.
Not surprisingly, the type of data determines which tools and
techniques can
be used to analyze the data. Frrthermore, new research in data
mining is
often driven by the need to accommodate new application areas
and their new
types of data.
The Quality of the Data Data is often far from perfect. while
most data
mining techniques can tolerate some level of imperfection in the
data, a focus
on understanding and improving data quality typically improves
the quality
79. of the resulting analysis. Data quality issues that often need to
be addressed
include the presence of noise and outliers; missing,
inconsistent, or duplicate
data; and data that is biased or, in some other way,
unrepresentative of the
phenomenon or population that the data is supposed to describe.
Preprocessing Steps to Make the Data More suitable for Data
Min-
ing often, the raw data must be processed in order to make it
suitable for
analysis. While one objective may be to improve data quality,
other goals
focus on modifying the data so that it better fits a specified data
mining tech-
nique or tool. For example, a continuous attribute, e.g., length,
m&y need to
be transformed into an attribute with discrete categories, e.g.,
short, med,ium,
or long, in order to apply a particular technique. As another
example, the
20 Chapter 2 Data
number of attributes in a data set is often reduced because many
techniques
are more effective when the data has a relatively small number
of attributes.
Analyzing Data in Terms of Its Relationships One approach to
data
80. analysis is to find relationships among the data objects and then
perform
the remaining analysis using these relationships rather than the
data objects
themselves. For instance, we can compute the similarity or
distance between
pairs of objects and then perform the analysis-clustering,
classification, or
anomaly detection-based on these similarities or distances.
There are many
such similarity or distance measures) and the proper choice
depends on the
type of data and the particular application.
Example 2.1 (An Illustration of Data-Related Issues). To further
il-
Iustrate the importance of these issues, consider the following
hypothetical sit-
uation. You receive an email from a medical researcher
concerning a project
that you are eager to work on.
H i ,
I've attached the data file that I mentioned in my previous
email.
Each line contains the information for a single patient and
consists
81. of five fields. We want to predict the last field using the other
fields.
I don't have time to provide any more information about the
data
since I'm going out of town for a couple of days, but hopefully
that
won't slow you down too much. And if you don't mind, could
we
meet when I get back to discuss your preliminary results? I
might
invite a few other members of mv team.
Thanks and see you in a couple of days.
Despite some misgivings, you proceed to analyze the data. The
first few
rows of the fiIe are as follows:
2 3 2 3 3 . 5 0 1 0 . 7
7 2 r 1 6 . 9 2 2 L 0 . L
1 6 5 2 4 . 0 0 4 2 7 . 6
A brieflook at the data reveals nothing strange. You put your
doubts aside
and start the analysis. There are only 1000 lines, a smaller data
file than you
had hoped for, but two days later, you feel that you have made
some progress.
You arrive for the meeting, and while waiting for others to
arrive, you strike
82. 0r2
020
027
2 L
up a conversation with a statistician who is working on the
project. When she
learns that you have also been analyzing the data from the
project, she asks
if you would mind giving her a brief overview of your results.
Statistician: So, you got the data for all the patients?
Data Miner: Yes. I haven't had much time for analysis, but I
do have a few interesting results.
Statistician: Amazing. There were so many data issues with
this set of patients that I couldn't do much.
Data Miner: Oh? I didn't hear about any possible problems.
Statistician: Well, first there is field 5, the variable we want to
predict. It's common knowledge among people who analyze
this type of data that results are better if you work with the
log of the values, but I didn't discover this until later. Was it
mentioned to you?
Data Miner: No.
Statistician: But surely you heard about what happened to field
4? It's supposed to be measured on a scale from 1 to 10, with
0 indicating a missing value, but because of a data entry
error, all 10's were changed into 0's. Unfortunately, since
some of the patients have missing values for this field, it's
83. impossible to say whether a 0 in this field is a real 0 or a 10.
Quite a few of the records have that problem.
Data Miner: Interesting. Were there any other problems?
Statistician: Yes, fields 2 and 3 are basically the same, but I
assume that you probably noticed that.
Data Miner: Yes, but these fields were only weak predictors of
field 5.
Statistician: Anyway, given all those problems, I'm surprised
you were able to accomplish anything.
Data Miner: Thue, but my results are really quite good. Field 1
is a very strong predictor of field 5. I'm surprised that this
wasn't noticed before.
Statistician: What? Field 1 is just an identification number.
Data Miner: Nonetheless, my results speak for themselves.
Statistician: Oh, no! I just remembered. We assigned ID
numbers after we sorted the records based on field 5. There is
a strong connection, but it's meaningless. Sorry.
Table 2,1. A sample data set containing student information.
22 Chapter 2 Data
Although this scenario represents an extreme situation, it
emphasizes the
importance of "knowing your data." To that end, this chapter
will address
84. each of the four issues mentioned above, outlining some of the
basic challenges
and standard approaches.
2.L Types of Data
A data set can often be viewed as a collection of data objects.
Other
names for a data object are record, po'int, uector, pattern, euent,
case, sample,
obseruat'ion, or ent'ity. In turn, data objects are described by a
number of
attributes that capture the basic characteristics of an object,
such as the
mass of a physical object or the time at which an event
occurred. Other
names for an attribute are uariable, characteristi,c, field,
feature, ot d'imens'ion.
Example 2.2 (Student Information). Often, a data set is a file, in
which
the objects are records (or rows) in the file and each field (or
column) corre-
sponds to an attribute. For example, Table 2.1 shows a data set
that consists
of student information. Each row corresponds to a student and
85. each column
is an attribute that describes some aspect of a student, such as
grade point
average (GPA) or identification number (ID).
Student ID Year Grade Point Average (GPA)
Senior
Sophomore
Fleshman
I
Although record-based data sets are common, either in flat files
or rela-
tional database systems, there are other important types of data
sets and
systems for storing data. In Section 2.I.2,we will discuss some
of the types of
data sets that are commonly encountered in data mining.
However, we first
consider attributes.
1034262
1052663
1082246
3 . 2 4
3 . 5 1
3 . 6 2
86. 2.L Types of Data 23
2.L.t Attributes and Measurement
In this section we address the issue of describing data by
considering what
types of attributes are used to describe data objects. We first
define an at-
tribute, then consider what we mean by the type of an attribute,
and finally
describe the types of attributes that are commonly encountered.
What Is an attribute?
We start with a more detailed definition of an attribute.
Definition 2.1. An attribute is a property or characteristic of an
object
that may vary; either from one object to another or from one
time to another.
For example, eye color varies from person to person, while the
temperature
of an object varies over time. Note that eye color is a symbolic
attribute with
a small number of possible values {brown,black,blue, green,
hazel, etc.}, while
temperature is a numerical attribute with a potentially unlimited
number of
values.
At the most basic level, attributes are not about numbers or
symbols.
87. However, to {iscuss and more precisely analyze the
characteristics of objects,
we assign numbers or symbols to them. To do this in a well-
defined way, we
need a measurement scale.
Definition 2.2. A measurement scale is a rule (function) that
associates
a numerical or symbolic value with an attribute of an object.
Formally, the process of measurement is the application of a
measure-
ment scale to associate a value with a particular attribute of a
specific object.
While this may seem a bit abstract, we engage in the process of
measurement
all the time. For instance, we step on a bathroom scale to
determine our
weight, we classify someone as male or female, or we count the
number of
chairs in a room to see if there will be enough to seat all the
people coming to
a meeting. In all these cases) the "physical value" of an
attribute of an object
is mapped to a numerical or symbolic value.
With this background, we can now discuss the type of an
attribute, a
concept that is important in determining if a particular data
analysis technique
is consistent with a specific type of attribute.
The Type of an Attribute
It should be apparent from the previous discussion that the
properties of an
88. attribute need not be the same as the properties of the values
used to mea-
24 Chapter 2 Data
sure it. In other words, the values used to represent an attribute
may have
properties that are not properties of the attribute itself, and vice
versa. This
is illustrated with two examples.
Example 2.3 (Employee Age and ID Number). Two attributes
that
might be associated with an employee are ID and age (in years).
Both of these
attributes can be represented as integers. However, while it is
reasonable to
talk about the average age of an employee, it makes no sense to
talk about
the average employee ID. Indeed, the only aspect of employees
that we want
to capture with the ID attribute is that they are distinct.
Consequently, the
only valid operation for employee IDs is to test whether they
are equal. There
89. is no hint of this limitation, however, when integers are used to
represent the
employee ID attribute. For the age attribute, the properties of
the integers
used to represent age are very much the properties of the
attribute. Even so,
the correspondence is not complete since, for example, ages
have a maximum'
while integers do not.
Example 2.4 (Length of Line Segments). Consider Figure 2.1,
which
shows some objects-line segments and how the length attribute
of these
objects can be mapped to numbers in two different ways. Each
successive
line segment, going from the top to the bottom, is formed by
appending the
topmost line segment to itself. Thus, the second line segment
from the top is
formed by appending the topmost line segment to itself twice,
the third line
segment from the top is formed by appending the topmost line
segment to
itself three times, and so forth. In a very real (physical) sense,
90. all the line
segments are multiples of the first. This fact is captured by the
measurements
on the right-hand side of the figure, but not by those on the left
hand-side.
More specifically, the measurement scale on the left-hand side
captures only
the ordering of the length attribute, while the scale on the right-
hand side
captures both the ordering and additivity properties. Thus, an
attribute can be
measured in a way that does not capture all the properties of the
attribute. t
The type of an attribute should tell us what properties of the
attribute are
reflected in the values used to measure it. Knowing the type of
an attribute
is important because it tells us which properties of the measured
values are
consistent with the underlying properties of the attribute, and
therefore, it
allows us to avoid foolish actions, such as computing the
average employee ID.
Note that it is common to refer to the type of an attribute as the
91. type of a
measurement scale.
2.1 Types of Data 25
----> 1
----> 2
--> 3
--> 5
A mapping of lengths to numbers
propertiesof rensth. nffii?;'fi"::ilin""till8i n*o
Figure 2.1. The measurement of the length of line segments on
two different scales of measurement.
The Different Types of Attributes
A useful (and simple) way to specify the type of an attribute is
to identify
the properties of numbers that correspond to underlying
properties of the
attribute. For example, an attribute such as length has many of
the properties
of numbers. It makes sense to compare and order objects by
length, as well
as to talk about the differences and ratios of length. The
following properties
(operations) of numbers are typically used to describe
attributes.
92. 1. Distinctness : and *
2 . O r d e r < ) < , > , a n d )
3. Addition * and -
4. Multiplication x and /
Given these properties, we can define four types of attributes :
nominal,
ordinal, interval, and ratio. Table 2.2 gives the definitions of
these types,
along with information about the statistical operations that are
valid for each
type. Each attribute type possesses all of the properties and
operations of the
attribute types above it. Consequently, any property or
operation that is valid
for nominal, ordinal, and interval attributes is also valid for
ratio attributes.
In other words, the definition of the attribute types is
cumulative. However,
26 Chapter 2 Data
this does not mean that the operations appropriate for one
attribute type are
appropriate for the attribute types above it.
Nominal and ordinal attributes are collectively referred to as
categorical
or qualitative attributes. As the name suggests, qualitative
93. attributes, such
as employee ID, lack most of the properties of numbers. Even if
they are rep-
resented by numbers, i.e., integers, they should be treated more
like symbols.
The remaining two types of attributes, interval and ratio, are
collectively re-
ferred to as quantitative or numeric attributes. Quantitative
attributes are
represented by numbers and have most of the properties of
numbers. Note
that quantitative attributes can be integer-valued or continuous.
The types of attributes can also be described in terms of
transformations
that do not change the meaning of an attribute. Indeed, S. Smith
Stevens, the
psychologist who originally defined the types of attributes
shown in Table 2.2,
defined them in terms of these permissible transformations. For
example,
Table 2.2, Different attribute types.
Attribute
Type Description Examples Operations
94. Nominal The values of a nominal
attribute are just different
names; i.e., nominal values
provide only enough
information to distinguish
one object from another.
t - +
- ) T l
codes,
employee ID numbers,
eye color, gender
zrp mode, entropy,
contingency
correlation,
y2 test
Ordinal The values of an ordinal
attribute provide enough
information to order
objects.
( < , > )
hardness of minerals,
{good,better,best},
grades,
street numbers
median,
percentiles,
rank correlation,
run tests,
siqn tests
95. lnterval For interval attributes, the
differences between values
are meaningful, i.e., a unit
of measurement exists.
( + , - )
calendar dates,
temperature in Celsius
or Fahrenheit
mean,
standard deviation,
Pearson's
correlation,
t and F tests
Katto For ratio variables, both
differences and ratios are
meaningful.
( +, l )
temperature in Kelvin.
monetary quantities,
counts, age, mass,
length,
electrical current
geometric mean,
harmonic mean,
percent
variation
Table 2,3. Transformations that define attribute levels,
Attribute
96. Typ" Tlansformation Comment
Nominal Any one-to-one mapping, €.g., &
permutation of values
It all employee IIJ numbers are
reassigned, it will not make any
differcnce
()rdinal An order-preserving change of
values. i.e..
new _u alue : f (old _u alue),
where / is a monotonic function.
An attribute encompassing the
notion of good, better, best can
be represented equally well by
the values {1,2,3} or by
{ 0 . 5 , 1 , 1 0 } .
Interval new -ualue : a * old-talue I b,
o. and b constants.
The Fahrenheit and Celsius
temperature scales differ in the
Iocation of their zero value and
the size of a degree (unit).
Ratio new -ualue : a * ol,d-ua|ue Length can be measured in
meters or feet.
2 . L Types of Data 27
the meaning of a length attribute is unchanged if it is measured
in meters
instead of feet.
97. The statistical operations that make sense for a particular type
of attribute
are those that will yield the same results when the attribute is
transformed us-
ing a transformation that preserves the attribute's meaning. To
illustrate, the
average length of a set of objects is different when measured in
meters rather
than in feet, but both averages represent the same length. Table
2.3 shows the
permissible (meaning-preserving) transformations for the four
attribute types
of Table 2.2.
Example 2.5 (Temperature Scales). Temperature provides a
good illus-
tration of some of the concepts that have been described. First,
temperature
can be either an interval or a ratio attribute, depending on its
measurement
scale. When measured on the Kelvin scale, a temperature of 2o
is, in a physi-
cally meaningful way, twice that of a temperature of 1o. This is
not true when
temperature is measured on either the Celsius or Fahrenheit
scales, because,
physically, a temperature of 1o Fahrenheit (Celsius) is not much
different than
a temperature of 2" Fahrenheit (Celsius). The problem is that
the zero points
of the Fahrenheit and Celsius scales are, in a physical sense,
arbitrary, and
therefore, the ratio of two Celsius or Fahrenheit temperatures is
not physi-
cally meaningful.
98. 28 Chapter 2 Data
Describing Attributes by the Number of Values
An independent way of distinguishing between attributes is by
the number of
values they can take.
Discrete A discrete attribute has a finite or countably infinite
set of values.
Such attributes can be categorical, such as zip codes or ID
numbers,
or numeric, such as counts. Discrete attributes are often
represented
using integer variables. Binary attributes are a special case of
dis-
crete attributes and assume only two values, e.g., true/false,
yes/no,
male/female, or 0f 1. Binary attributes are often represented as
Boolean
variables, or as integer variables that only take the values 0 or
1.
Continuous A continuous attribute is one whose values are real
numbers. Ex-
amples include attributes such as temperature, height, or weight.
Con-
tinuous attributes are typically represented as floating-point
variables.
Practically, real values can only be measured and represented
with lim-
ited precision.
99. In theory, any of the measurement scale types-nominal, ordinal,
interval, and
ratio could be combined with any of the types based on the
number of at-
tribute values-binary, discrete, and continuous. However, some
combinations
occur only infrequently or do not make much sense. For
instance, it is difficult
to think of a realistic data set that contains a continuous binary
attribute.
Typically, nominal and ordinal attributes are binary or discrete,
while interval
and ratio attributes are continuous. However, count attributes,
which are
discrete, are also ratio attributes.
Asymmetric Attributes
For asymmetric attributes, only presence a non-zero attribute
value-is re-
garded as important. Consider a data set where each object is a
student and
each attribute records whether or not a student took a particular
course at
a university. For a specific student, an attribute has a value of 1
if the stu-
dent took the course associated with that attribute and a value of
0 otherwise.
Because students take only a small fraction of all available
courses, most of
the values in such a data set would be 0. Therefore, it is more
meaningful
and more efficient to focus on the non-zero values. To
illustrate, if students
are compared on the basis of the courses they don't take, then
most students
100. would seem very similar, at least if the number of courses is
large. Binary
attributes where only non-zero values are important are called
asymmetric
2 . L Types of Data 29
binary attributes. This type of attribute is particularly important
for as-
sociation analysis, which is discussed in Chapter 6. It is also
possible to have
discrete or continuous asymmetric features. For instance, if the
number of
credits associated with each course is recorded, then the
resulting data set will
consist of asymmetric discrete or continuous attributes.
2.L.2 Types of Data Sets
There are many types of data sets, and as the field of data
mining develops
and matures, a greater variety of data sets become available for
analysis. In
this section, we describe some of the most common types. For
convenience,
we have grouped the types of data sets into three groups: record
data, graph-
based data, and ordered data. These categories do not cover all
possibilities
and other groupings are certainly possible.
General Characteristics of Data Sets
Before providing details of specific kinds of data sets, we
101. discuss three char-
acteristics that apply to many data sets and have a significant
impact on the
data mining techniques that are used: dimensionality, sparsity,
and resolution.
Dimensionality The dimensionality of a data set is the number
of attributes
that the objects in the data set possess. Data with a small
number of dimen-
sions tends to be qualitatively different than moderate or high-
dimensional
data. Indeed, the difficulties associated with analyzing high-
dimensional data
are sometimes referred to as the curse of dimensionalit y.
Because of this,
an important motivation in preprocessing the data is
dimensionality reduc-
tion. These issues are discussed in more depth later in this
chapter and in
Appendix B.
Sparsity For some data sets, such as those with asymmetric
features, most
attributes of an object have values of 0; in many casesT fewer
than 1% of
the entries are non-zero. In practical terms, sparsity is an
advantage because
usually only the non-zero values need to be stored and
manipulated. This
results in significant savings with respect to computation time
and storage.
FurthermoreT some data mining algorithms work well only for
sparse data.
Resolution It is frequently possible to obtain data at different
102. levels of reso-
Iution, and often the properties ofthe data are different at
different resolutions.
For instance, the surface of the Earth seems very uneven at a
resolution of a
30 Chapter 2 Data
few meters, but is relatively smooth at a resolution of tens of
kilometers. The
patterns in the data also depend on the level of resolution. If the
resolution
is too fine, a pattern may not be visible or may be buried in
noise; if the
resolution is too coarse, the pattern may disappear. For
example, variations
in atmospheric pressure on a scale of hours reflect the
movement of storms
and other weather systems. On a scale of months, such
phenomena are not
detectable.
Record Data
Much data mining work assumes that the data set is a collection
of records
(data objects), each of which consists of a fixed set of data
fields (attributes).
See Figure 2.2(a). For the most basic form of record data, there
is no explicit
relationship among records or data fields, and every record
(object) has the
same set of attributes. Record data is usually stored either in
103. flat files or in
relational databases. Relational databases are certainly more
than a collection
of records, but data mining often does not use any of the
additional information
available in a relational database. Rather, the database serves as
a convenient
place to find records. Different types of record data are
described below and
are illustrated in Figure 2.2.
Tbansaction or Market Basket Data Tbansaction data is a
special type
of record data, where each record (transaction) involves a set of
items. Con-
sider a grocery store. The set of products purchased by a
customer during one
shopping trip constitutes a transaction, while the individual
products that
were purchased are the items. This type of data is called market
basket
data because the items in each record are the products in a
person's "mar-
ket basket." Tlansaction data is a collection of sets of items, but
it can be
viewed as a set of records whose fields are asymmetric
attributes. Most often,
the attributes are binary, indicating whether or not an item was
purchased,
but more generally, the attributes can be discrete or continuous,
such as the
number of items purchased or the amount spent on those items.
Figure 2.2(b)
shows a sample transaction data set. Each row represents the
purchases of a
particular customer at a particular time.
104. The Data Matrix If the data objects in a collection of data all
have the
same fixed set of numeric attributes, then the data objects can
be thought of as
points (vectors) in a multidimensional space, where each
dimension represents
a distinct attribute describing the object. A set of such data
objects can be
interpreted as an n'L by n matrix, where there are rn rows, one
for each object,
2.L Types of Data 31
(a) Record data. (b) Ttansaction data.
Document 1 0 0 2 o 0 0 2
Document 2 0 7 0 0 0 0 0
Document 3 0 I 0 0 2 2 0 o 0
(c) Data matrix. (d) Document-term matrix.
Figure 2.2, Different variations of record data.
and n columns, one for each attribute. (A representation that has
data objects
as columns and attributes as rows is also fine.) This matrix is
called a data
matrix or a pattern matrix. A data matrix is a variation of record
data,
but because it consists of numeric attributes, standard matrix
operation can
105. be applied to transform and manipulate the data. Therefore, the
data matrix
is the standard data format for most statistical data. Figure
2.2(c) shows a
sample data matrix.
The Sparse Data Matrix A sparse data matrix is a special case of
a data
matrix in which the attributes are of the same type and are
asymmetric; i.e.,
only non-zero values are important. Transaction data is an
example of a sparse
data matrix that has only 0 1 entries. Another common example
is document
data. In particular, if the order of the terms (words) in a
document is ignored,
32 Chapter 2 Data
then a document can be represented as a term vector, where
each term is
a component (attribute) of the vector and the value of each
component is
the number of times the corresponding term occurs in the
document. This
representation of a collection of documents is often called a
document-term
matrix. Figure 2.2(d) shows a sample document-term matrix.
The documents
are the rows of this matrix, while the terms are the columns. In
practice, only
the non-zero entries of sparse data matrices are stored.
Graph-Based Data
106. A graph can sometimes be a convenient and powerful
representation for data.
We consider two specific cases: (1) the graph captures
relationships among
data objects and (2) the data objects themselves are represented
as graphs.
Data with Relationships among Objects The relationships
among ob-
jects frequently convey important information. In such cases,
the data is often
represented as a graph. In particular, the data objects are
mapped to nodes
of the graph, while the relationships among objects are captured
by the links
between objects and link properties, such as direction and
weight. Consider
Web pages on the World Wide Web, which contain both text
and links to
other pages. In order to process search queries, Web search
engines collect
and process Web pages to extract their contents. It is well
known, however,
that the links to and from each page provide a great deal of
information about
the relevance of a Web page to a query, and thus, must also be
taken into
consideration. Figure 2.3(a) shows a set of linked Web pages.
Data with Objects That Are Graphs If objects have structure,
that
is, the objects contain subobjects that have relationships, then
such objects
are frequently represented as graphs. For example, the structure
of chemical
107. compounds can be represented by a graph, where the nodes are
atoms and the
links between nodes are chemical bonds. Figure 2.3(b) shows a
ball-and-stick
diagram of the chemical compound benzene, which contains
atoms of carbon
(black) and hydrogen (gray). A graph representation makes it
possible to
determine which substructures occur frequently in a set of
compounds and to
ascertain whether the presence of any of these substructures is
associated with
the presence or absence of certain chemical properties, such as
melting point
or heat of formation. Substructure mining, which is a branch of
data mining
that analyzes such data, is considered in Section 7.5.
2 . 1 Types of Data 33
(a) Linked Web pages. (b) Benzene molecule.
Figure 2.3. Different variations of graph data.
Ordered Data
For some types of data, the attributes have relationships that
involve order
in time or space. Different types of ordered data are described
next and are
shown in Figure 2.4.
Sequential Data Sequential data, also referred to as temporal
108. data, can
be thought of as an extension of record data, where each record
has a time
associated with it. Consider a retail transaction data set that
also stores the
time at which the transaction took place. This time information
makes it
possible to find patterns such as "candy sales peak before
Halloween." A time
can also be associated with each attribute. For example, each
record could
be the purchase history of a customer, with a listing of items
purchased at
different times. Using this information, it is possible to find
patterns such as
"people who buy DVD players tend to buy DVDs in the period
immediately
following the purchase."
Figure [email protected]) shows an example of sequential
transaction data. There
are fi.ve different times-/7, t2, t3, tl, and t5; three different
customers-Cl,
Useful Links:
. [email protected] -
. mer Useful Web sib
o ACM SIGmD
o onuqqets
o fteDahh€
Knowledge Discovery and