Monday, March 16, 2020
Modelling data is concerned with representing real life situations Essay Example
Modelling data is concerned with representing real life situations Essay Example Modelling data is concerned with representing real life situations Essay Modelling data is concerned with representing real life situations Essay Modelling is concerned with representing real life situations. Variables can be changed with a model to find out different outcomes. Modelling has a number of advantages: * It is cheaper to set up a computer model than build the physical model. * The computer model can be changed modified quickly and easily to allow the user to view the effects of changing variables. * You can reset your test as often as you like. * Dangerous situations or conditions can be modelled safely. * Using a computer model speeds up the overall development process. Below are also some various disadvantages: * A computer model may not completely reflect real life situations. * Answers and results are only as good as the model. * Humans are unpredictable in nature so the model may be considered unreliable. The spreadsheet package has been adopted for this modelling situation. This is a package which models and processes numerical data. It is made up of a grid into which numbers are entered. The program contains many mathematical, statistical and financial calculations, which can be applied to the numbers. Spreadsheets can also present the numbers in the form of graphs. Spreadsheet packages come with a library of formulae and functions as part of the program. There are formulae for financial calculations, for handling dates and times, for mathematical and statistical work and for logical expressions. The spreadsheet may contain numbers, text, dates and formulas. Each cell, or a block cells may be formatted so that the contents of the cell is displayed in different ways. When a cell is selected, the contents of the cell are shown on the editing bar but the results of any calculation are displayed in the cell. The power of a spreadsheet comes from its ability to do calculations with numbers. The contents of one cell can be calculated from other cells in the sheet. SITUATION: The Tasty Bakery LTD is a small independent bakery operating in Finchley. Currently all sales information and prices are calculated and processed manually. The management has decided that this is not the most efficient way of keeping track of price increases, unit sales, total sales and total revenue. Currently the companys sales information and prices are calculated and processed manually. The disadvantages of the present method adopted by the company are numerous. Firstly, the manual method takes up valuable space, as files would be stored in filling cabinets. This method would prove difficult in locating specific files and records. Secondly, amendments to records cannot easily be done as they are written on paper, and the paper can easily be damaged or lost. Consequently transportation from place to place of the files would be difficult and tedious. I aim to solve the bakerys problem by constructing and designing a spreadsheet that shall assist the bakery in keeping track of price increases, unit sales, total sales, and the total revenue. The spreadsheet will allow the bakery to store data, such as items being sold, and the selling and buying price of products. It will also store daily and weekly sales and profits for each of the products and calculate the total revenue of the bakery. The spreadsheet will make it simplistic to update, change variables, and calculate profit and losses of the bakery efficiently. The results of the spreadsheet has made it simple for the Bakery to make decisions about which of their products are high in demand and yield the most profit for the bakery. From the results of the spreadsheet it can be seen that the bakery are buying their products for more than they are selling them. This loss can easily be spotted on the spreadsheet in contrast to bakerys previous manual method. Any decision to rectify this loss can be done on the spreadsheet. The spreadsheet contains many patterns, with various parts of the spreadsheet being related. The price relates to the cost; there is a constant proportionality rate between the cost of the product and its selling price. Hence, if the cost of a product is high, so too is its selling price. Another pattern would be the relationship between the revenue and sales. This means that the more sales that the company can make, the higher the revenue made. The revenue also relates to the cost to determine the bakerys profit. This profit can be obtained by subtracting the revenue from the cost. The model operates when the cost of the product has been ascertained. This then affects the selling price of the product, depending on the bakery management. The total sale of the products has to be entered in under the various days of the week. The sales are then cumulated together to give the total weekly sales. The spreadsheet calculates the Total cost by multiplying the cost of the product by its number of sales. This information is then cumulated together to ascertain the total weekly costs. A similar operation is done to obtain the total revenue. The multiplication of the products selling price and its number of sales, gives the total revenue. This is then cumulated to give the total weekly revenue. Finally, the spreadsheet calculates the profit by subtracting the revenue from the cost. This is the cumulated to ascertain the total weekly profit. Each cell has formulas, to which any data entered must comply. Changing the sales section in the spreadsheet to suit present requirements will cause an immediate change in the total cost, total revenue and total profit to comply with these changes. These automatic changes are due to the cells complying with their formula. I tried a number of What if scenarios on my spreadsheet. These were to increase the cost by 20, 40 and 60 per cent respectively. Before I carried out the What if scenarios I decided to make some predictions about what I thought the outcomes would be after the increases. * Because of the increases i 20% INCREASE: As can be seen from a 20% increase of the cost, in the total sales section, the spreadsheet has automatically altered the other sections accordingly. The new total weekly revenue is now à ¯Ã ¿Ã ½743.47 in contrast to the total weekly revenue prior to the increase, which was à ¯Ã ¿Ã ½619.56. 40% INCREASE; From the 40% increase of the cost, in the sales section the new total weekly revenue is now à ¯Ã ¿Ã ½867.39, this is in contrast to the total weekly revenue prior to the increase, which was à ¯Ã ¿Ã ½619.56. 60% INCREASE: As can be seen from a 60% increase of the cost, the total weekly revenue is now à ¯Ã ¿Ã ½991.30; this is in contrast to the total weekly revenue prior to the increase, which was à ¯Ã ¿Ã ½619.56.
Saturday, February 29, 2020
Biosensors or enzyme electrodes
Biosensors or enzyme electrodes INTRODUCTION OF BIOSENSORS:- Biosensors or enzyme electrodes invariably refer to such devices that sence and analyze biological informations. A biosensor is a device that detects, records, and transmits information regarding a physiological change or the presence of various chemical or biological materials in the environment. More technically, a biosensor is a probe that integrates a biological component, such as a whole bacterium or a biological product (e.g., an enzyme or antibody) with an electronic component to yield a measurable signal. Biosensors, which come in a large variety of sizes and shapes, are used to monitor changes in environmental conditions. They can detect and measure concentrations of specific bacteria or hazardous chemicals; they can measure acidity levels (pH). In short, biosensors can use bacteria and detect them, too. PRINCIPALS OF BIOSENSORS:- A biosensor essentially comprise of the following two major parts 1- Biological component- For sensing the presence as well as concentration of analyte. In the presence of a certain molecule the biological system changes the environment. The measuring device sensitive to this change sends a signal. This signal can be converted into the measurement parameter. Often the biological system is an actual cell. The key thing to remember is that it is an actual organism that detects the concentration change of the molecule in the media. This organism could be the same one as the one in the media or it could be different. In either case it must be kept separate from the media. This can be done with a membrane that is permeable to the molecule that is being measured but impermeable to the cells and most other macromolecules in the reactor media. 2- Physical component:- Transducer:- A device that converts energy from one form into another e.g., telephone companies use transducers to convert sound energy into electrical energy to be carried long- distance through telephone lines and then another transducer a t the receiving end to convert the electrical energy back into sound A biosensor is a sensing device that consists of a biological component coupled to a transducer that converts biochemical activity into, most commonly, electrical energy. Types of Biosensors:- There are different types of biosensors, which have different applications. These are listed below. Calorimetric biosensor Potentiometric biosensor Amperometric biosensors Optical biosensor Acoustic wave biosensors Calorimetric biosensor:- When the physical change is heat, released or absorbed by the reaction it is calorimetric biosensor. It measures the change in temperature in the solution containing analyte Separate thermistors measure the temperature of the solution before entry into the small packed bed column containing immobilized enzyme and also at the time of leaving the column. Calorimetric biosensors are most widely applicable and can be used to measure turbid and strongly coloured s olutions. Maintenance of constant sample temperature is the disadvantage of this type. At the transducer surface, an electrical potential is produced due to changed distribution of electrons and this type of biosensors are called potentiometric biosensors. They use ion sensitive electrodes, commonly pH meter glass electrodes for cations, glass pH electrodes coated with a gas-selective membrane for CO2, NH3 or H2S or solid-state electrodes. These electrodes convert the biological reaction into electric signal. Potentiometric Biosensors
Wednesday, February 12, 2020
Body art and ornamentation of the Egyptian Copts and Hindi India Essay
Body art and ornamentation of the Egyptian Copts and Hindi India cultures - Essay Example d person as incomplete and they usually use a matchmaker to find possible marriage couples unlike the Copts who look for their own partners (Lindsey, 2012). After the couples are matched by the matchmaker the go to their parents for approval after which wedding preparations start immediately. These Hindu marriages happen in the most spiritual day- ocuta, early in the moment where the girl is led by the male around a fire (punit) seven times (Lindsey, 2012). The Hindi culture does not consider baptism in water. On the other hand, the Egyptian Copts baptize their children seven days after birth where the child is baptized by the father (Lindsey, 2012). The father washes the child in a washbowl and later prays the Salat elTist- the washbowl prayer. This process tales about 30 minutes and is followed by a two hour prayer where the child is given the holy secrets called the Tanawel (Lindsey, 2012). If a member of the Coptic culture dies, his/her body is washed by a family member, covered by a shroud and the whole family goes to church to pray for the dead. The priest then conducts the funeral service and the body is buried (Lindsey, 2012). There is no specific day for burial. On the other hand, the Indians had dissimilar ways of burying their dead based on their tribe (Lindsey, 2012). Some buried them under the ground in coffin while other burned their dead. The ashes were later buried or conserved in a sacred place depending on their social status (Lindsey, 2012). The principal garment that was worn during the ancient Coptic period was a tunic, usually made of linen but sometimes made of wool, with a tapestry-woven decoration. Over it was the pallium ââ¬â an oblong cloak which was similarly decorated as the tunic (Dimand, 1930). These tunics had adornments at the front and back together with shoulder bands of dissimilar lengths, and square roundels on the shoulders. The lower edge had trims of horizontal bands that turned at right angles on each side (Dimand, 1930).
Saturday, February 1, 2020
Graphic design is the branch of visual art Essay
Graphic design is the branch of visual art - Essay Example By effectiveness, we mean how much power a design has to motivate people or help them identify a company. For example, where a one or two letter sign may be effective in identifying a company such as BP, it is not effective for another company simply identified as B. Plus; presentation of an idea does not necessarily mean it was communicated accurately. A scribbled "keep off grass" sign is not as effective as a neatly designed "keep off grass" sign with an appropriately designed logo. Also, just because a sign communicates effectively does not mean what it communicates is good. Governments have become masters at influencing citizens with graphic design by communicating messages sometimes to support darkly political objectives. Graphic design is the branch of visual art dedicated to communicating messages. It is most used in marketing and brand recognition strategies. Having watch and listened to a video of a talk about design given by David Carson, I walk away with certain understandings about graphic design.
Thursday, January 23, 2020
Significance of the Attire of Men and Women in the 18th Century Essay
Significance of the Attire of Men and Women in the 18th Century The attire of men and women in the eighteenth century cemented the roles they were supposed to play. The style of made dress belied his nature as somewhat more free from restrictions whereas the woman, bound by corsets and strict dress-codes found herself held back in clothing as in society. A sphere of influence, behavior and conduct was assigned to both sexes; each was valued for different qualities. These gender distinctions do not allow any overlap between the two sexes. (Marsden, 21) In light of this, society viewed cross-dressing (the practice of one gender dressing themselves in the attire of the other) as a threat to its own structure. For a woman to forsake the clothes and character of women for that of men sounded monstrous. Such a practice would create sexual ambiguity - a woman would assume the clothes of a man and thus the manner and actions of a man, yet her physical nature denied her that right. Cross-dressing creates monstrations - a woman ceases to be a woman after she has assumed male garb and can never hope to be a man. An aversion to cross-dressing has its roots in the Bible: "The women shall not wear that which pertaineth unto a man, neither shall a man put on a woman's garment; for all that do so are abomination unto the Lord thy God" (qtd. in Garber, 28). On August 13, 1597 Queen Elizabeth announced a sumptuary (dealing with attire) proclamation which defined the "separate categories for men's and women's apparel: each took the form of a long list of proscribed items of dress with an indication of who alone was permitted to wear them" (Garber, 26). This law sought to prohibit the rise in classes that was transpiring - ambitious ind... ...both may wear the prototypical shirt and pants}, the gender distinctions become blur. Men feared the idea of women as sexually aggressive as men - or perhaps worse, women who pursued other women. mite simply, the idea of 'gender-swapping' caused fear and anger. Individuals designed the practice to work outside of the uniform social structure; such actions were seen as threats to the social structure. Thus, society acted strictly towards those who thought themselves 'above' social gender laws. Works Cited Garber, Marjorie. Vested Interests: Cross Dressing and Cultural Anxiety. New York: Routledge. 1992. 21-41, 211-215. Marsden, Jean I. "Modesty Unshackled: Dorothy Jordan and the Dangers of Cross-Dressing." Studies in Eighteenth-Century Culture vol. 22. Ed. by Patricia B. Craddock and Carla H. Hay. East Lansing, Michigan: Colleagues Press Inc. 1992. 21-36.
Wednesday, January 15, 2020
Isds Ch 5
Business Intelligence, 2e (Turban/Sharda/Delen/King) Chapter 5 Text and Web Mining 1) DARPA and MITRE teamed up to develop capabilities to automatically filter text-based information sources to generate actionable information in a timely manner. Answer: TRUE Diff: 2Page Ref: 190 2) A vast majority of business data is captured and stored in text documents that are structured. Answer: FALSE Diff: 2Page Ref: 192 3) Text mining is important to competitive advantage because knowledge is power, and knowledge is derived from text data sources. Answer: TRUE Diff: 2Page Ref: 192 ) The purpose and processes of text mining are different from those of data mining because with text mining the input to the process are data files such as Word documents, PDF files, text excerpts, and XML files. Answer: FALSE Diff: 3Page Ref: 192 5) The benefits of text mining are greatest in areas where very large amounts of textual data are being generated, such as law, academic research, finance, and medicine. Ans wer: TRUE Diff: 2Page Ref: 192 6) Unstructured data has a predetermined format. It is usually organized into records as categorical, ordinal, and continuous variables and stored in databases.Answer: FALSE Diff: 2Page Ref: 193 7) Stemming is the process of reducing inflected words to their base or root form. Answer: TRUE Diff: 1Page Ref: 193 8) Stop words, such as a, am, the, and was, are words that are filtered out prior to or after processing of natural language data. Answer: TRUE Diff: 2Page Ref: 193 9) The goal of natural language processing (NLP) is syntax-driven text manipulation. Answer: FALSE Diff: 2Page Ref: 196 10) Two advantages associated with the implementation of NLP are word sense disambiguation and syntactic ambiguity. Answer: FALSE Diff: 2Page Ref: 196 1) By applying a learning algorithm to parsed text, researchers from Stanford University's NLP lab have developed methods that can automatically identify the concepts and relationships between those concepts in the tex t. Answer: TRUE Diff: 2Page Ref: 197 12) Text mining can be used to increase cross-selling and up-selling by analyzing the unstructured data generated by call centers. Answer: TRUE Diff: 1Page Ref: 200 13) Compared to polygraphs for deception-detection, text-based deception detection has the advantages of being nonintrusive and widely applicable to textual data and transcriptions of voice recordings.Answer: TRUE Diff: 2Page Ref: 201 14) The main purpose of establishing the corpus is to collect all of the documents related to the context being studied. Answer: TRUE Diff: 2Page Ref: 207 15) The main categories of knowledge extraction methods are recall, search, and signaling. Answer: FALSE Diff: 2Page Ref: 210 16) Web pages consisting of unstructured textual data coded in HTML and logs of visitors' interactions provide rich data that can easily provide effective and efficient knowledge discovery. Answer: FALSE Diff: 3Page Ref: 217 7) Web crawlers are Web content mining tools that are used to read through the content of a Web site automatically. Answer: FALSE Diff: 1Page Ref: 218 18) Amazon. com leverages Web usage history dynamically and recognizes the user by reading a cookie written by a Web site on the visitor's computer. Answer: TRUE Diff: 1Page Ref: 221 19) The quality of search results is impossible to measure accurately using strictly quantitative measures such as click-through rate, abandonment, and search frequency. Additional quantitative and qualitative measures are required. Answer: TRUE Diff: 2Page Ref: 222 0) Customer experience management applications gather and report direct feedback from site visitors by benchmarking against other sites and offline channels, and by supporting predictive modeling of future visitor behavior. Answer: FALSE Diff: 3Page Ref: 224 21) A vast majority of business data are stored in text documents that are ________. A) mostly quantitative B) virtually unstructured C) semi-structured D) highly structured Answer: B Diff: 1 Page Ref: 192 22) Text mining is the semi-automated process of extracting ________ from large amounts of unstructured data sources.A) patterns B) useful information C) knowledge D) all of the above Answer: D Diff: 2Page Ref: 192 23) All of the following are popular application areas of text mining except: A) information extraction B) document summarization C) question answering D) data structuring Answer: D Diff: 2Page Ref: 193 24) Which of the following correctly defines a text mining term? A) Tagging is the number of times a word is found in a specific document. B) A token is an uncategorized block of text in a sentence. C) Rooting is the process of reducing inflected words to their base form.D) A term is a single word or multiword phrase extracted directly from the corpus by means of NLP methods. Answer: D Diff: 3Page Ref: 194 25) ________ is a branch of the field of linguistics and a part of natural language processing that studies the internal structure of words. A) Morphology B) Corpus C) Stemming D) Polysemes Answer: A Diff: 2Page Ref: 194 26) Using ________ as a rich source of knowledge and a strategic weapon, Kodak not only survives but excels in its market segment defined by innovation and constant change. A) visualization B) deception detection C) patent analysis D) semantic cuesAnswer: C Diff: 2Page Ref: 194 27) It has been shown that the bag-of-word method may not produce good enough information content for text mining tasks. More advanced techniques such as ________ are needed. A) classification B) natural language processing C) evidence-based processing D) symbolic processing Answer: B Diff: 2Page Ref: 195 28) Why will computers probably not be able to understand natural language the same way and with the same accuracy that humans do? A) A true understanding of meaning requires extensive knowledge of a topic beyond what is in the words, sentences, and paragraphs.B) The natural human language is too specific. C) The part of speech depends only on the definition and not on the context within which it is used. D) All of the above. Answer: A Diff: 3Page Ref: 196 29) At a very high level, the text mining process consists of each of the following tasks except: A) create log frequencies B) establish the corpus C) create the term-document matrix D) extract the knowledge Answer: A Diff: 2Page Ref: 207 30) In ________, the problem is to group an unlabelled collection of objects, such as documents, customer comments, and Web pages into meaningful groups without any prior knowledge.A) search recall B) classification C) clustering D) grouping Answer: C Diff: 2Page Ref: 211 31) The two main approaches to text classification are ________ and ________. A) knowledge engineering; machine learning B) categorization; clustering C) association; trend analysis D) knowledge extraction; association Answer: A Diff: 2Page Ref: 211 32) Commercial software tools include all of the following except: A) GATE B) IBM Intelligent Miner Data Mining Suite C ) SAS Text Miner D) SPSS Text Mining Answer: A Diff: 2Page Ref: 216 33) Why does the Web pose great challenges for effective and efficient knowledge discovery?A) The Web search engines are indexed-based. B) The Web is too dynamic. C) The Web is too specific to a domain. D) The Web infrastructure contains hyperlink information. Answer: B Diff: 2Page Ref: 217 34) A simple keyword-based search engine suffers from several deficiencies, which include all of the following except: A) a topic of any breath can easily contain hundreds or thousands of documents B) many documents that are highly relevant to a topic may not contain the exact keywords defining them C) web mining can identify authoritative Web pages D) many of the search results are marginally or not relevant to the topic Answer: CDiff: 3Page Ref: 217 35) Which of the following is not one of the three main areas of Web mining? A) Web search mining B) Web content mining C) Web structure mining D) Web usage mining Answer: A Diff: 2 Page Ref: 218 36) Which of the following refers to developing useful information from the links included in the Web documents? A) Web content mining B) Web subject mining C) Web structure mining D) Web matter mining Answer: C Diff: 2Page Ref: 219 37) A ________ is one or more Web pages that provide a collection of links to authoritative pages, reference sites, or a resource list on a specific topic.A) hub B) hyperlink-induced topic search C) spoke D) community Answer: A Diff: 2Page Ref: 219 38) All of the following are types of data generated through Web page visits except: A) data stored in server access logs, referrer logs, agent logs, and client-side cookies B) user profiles C) hyperlink analysis D) metadata, such as page attributes, content attributes, and usage data Answer: C Diff: 2Page Ref: 220 39) When registered users revisit Amazon. com, they are greeted by name. This task involves recognizing the user by ________. A) pattern discovery B) association C) text miningD) readi ng a cookie Answer: D Diff: 1Page Ref: 221 40) Forward-thinking companies like Ask. com, Scholastic, and St. John Health System are actively using Web mining systems to answer important questions of ââ¬Å"Who? â⬠ââ¬Å"Why? â⬠and ââ¬Å"How? â⬠The benefits of integrating these systems: A) are measured qualitatively in terms of customer satisfaction, but not measured using financial or other quantitative measure. B) can be significant in terms of incremental financial growth and increasing customer loyalty and satisfaction. C) have not yet outweighed the costs of the Web mining systems and analysis.D) can be infinitely measurable. Answer: B Diff: 3Page Ref: 222 41) ________ is the semi-automated process of extracting patterns from large amounts of unstructured data sources. Answer: Text mining Diff: 1Page Ref: 192 42) ________ is the process of identifying valid, novel, potentially useful, and ultimately understandable patterns in data stored in structured database s, where the data are organized in records structured by categorical, ordinal, or continuous variables. Answer: Data mining Diff: 1Page Ref: 192 43) ________ is the grouping of similar documents without having a predefined set of categories.Answer: Clustering Diff: 2Page Ref: 193 44) In linguistics, a(n) ________ is a large and structured set of texts prepared for the purpose of conducting knowledge discovery. Answer: corpus Diff: 1Page Ref: 193 45) ________ is the process of reducing inflected words to their base or root form. Answer: Stemming Diff: 1Page Ref: 193 46) ________ words or noise words are words that are filtered out prior to or after processing of natural language data. Answer: Stop Diff: 1Page Ref: 193 47) The term ââ¬Å"stop-wordsâ⬠are used by text mining to ________ commonly used words.Answer: eliminate Diff: 2Page Ref: 193 48) ________ is an important component of text mining and is a subfield of artificial intelligence and computational linguistics. It stud ies the problem of understanding the natural human language. Answer: Natural language processing (NLP) Diff: 1Page Ref: 196 49) ________ analysis is a technique used to detect favorable and unfavorable opinions toward specific products and services using textual data sources, such as customer feedback in Web postings and the detection of unfavorable rumors. Answer: Sentiment Diff: 2Page Ref: 197 0) At a very high level, the first of three consecutive tasks in the text mining process is to establish the ________, which is a list of organized documents. Answer: corpus Diff: 1Page Ref: 207 51) In the text mining process, the output of task two is a flat file called a ________ matrix where the cells are populated with the term frequencies. Answer: term-document Diff: 3Page Ref: 207 52) One of the main approaches to text classification is ________ in which an expert's knowledge is encoded into the system either declaratively or in the form of procedural classification rules.Answer: knowl edge engineering Diff: 2Page Ref: 211 53) A(n) ________ is one or more Web pages that provide a collection of links to authoritative pages. Answer: hub Diff: 1Page Ref: 219 54) ________ mining is the process of extracting useful information from the links embedded in Web documents. Answer: Web structure Diff: 2Page Ref: 219 55) ________ mining is the extraction of useful information from data generated through Web page visits and transactions. Answer: Web usage Diff: 2Page Ref: 220 56) Analysis of the information collected by Web servers can help better understand user behavior.Analysis of this data is called ________ analysis. Answer: clickstream Diff: 2Page Ref: 220 57) ________ applications focus on ââ¬Å"who and howâ⬠questions by gathering and reporting direct feedback from site visitors, by benchmarking against other sites and offline channels, and by supporting predictive modeling of future visitor behavior. Answer: Voice of Customer Diff: 2Page Ref: 224 58) Web analyti cs, CEM, and VOC applications form the foundation of the Web site ________ ecosystem that supports the online business' ability to positively influence desired outcomes. Answer: optimization Diff: 2Page Ref: 224 9) The ________ model, which is one where multiple sources of data describing the same population are integrated to increase the depth and richness of the resulting analysis, forms the framework of the Web site optimization ecosystem. Answer: convergent validation Diff: 3Page Ref: 225 60) Fundamental to the optimization process is ________, gathering data and information that can then be transformed into tangible analysis and recommendations for improvement using Web mining tools and techniques. Answer: measurement Diff: 3Page Ref: 225 61) Compare and contrast text mining and data mining.Answer: Text mining is the semi-automated process of extracting patterns (useful information and knowledge) from large amounts of unstructured data sources. Data mining is the process of ide ntifying valid, novel, potentially useful, and understandable patterns in data stored in structured databases, where the data are organized in records structured by categorical, ordinal, or continuous variables. Text mining is the same as data mining in that it has the same purpose and uses the same processes, but with text mining the input to the process is a collection of unstructured data files such as Word documents, PDF files, and so on.Diff: 2Page Ref: 192 62) Why will computers probably not be able to understand natural language the same way and with the same accuracy that humans do? Answer: Natural human language is vague for computers to understand; and a true understanding of meaning requires extensive knowledge of a topic beyond what is in the words, sentences, and paragraphs. Diff: 1Page Ref: 196 63) NLP has successfully been applied to a variety of tasks via computer programs to automatically process natural human language that previously could only be done by humans.Li st three of the most popular of these tasks. Answer: Any three of the following: â⬠¢Information retrieval. The science of searching for relevant documents, finding specific information within them, and generating metadata as to their contents. â⬠¢Information extraction. A type of information retrieval whose goal is to automatically extract structured information from a certain domain, using machine-readable documents. â⬠¢Question answering. The task of automatically answering a question posed in natural language; that is, producing a human-language answer when given a human-language question. Automatic summarization. The creation of a shortened version of a text document by a computer program that contains the most important points of the document. â⬠¢Natural language generation. Systems convert information from computer databases into readable human language. â⬠¢Natural language understanding. Systems convert samples of human language into more formal representa tions that are easier for computer programs to manipulate. â⬠¢Machine translation. The automatic translation of one human language to another. â⬠¢Foreign language reading. A computer program that assists a onnative language speaker to read a foreign language. â⬠¢Foreign language writing. A computer program that assists a nonnative language user in writing in a foreign language. â⬠¢Speech recognition. Converts spoken words to machine-readable input. â⬠¢Text-to-speech. A computer program converts normal language text into human speech. â⬠¢Text proofing. A computer program reads a proof copy of a text in order to detect and correct any errors. â⬠¢Optical character recognition. The automatic translation of images of handwritten, typewritten, or printed text.Diff: 2Page Ref: 199 64) Describe a marketing application of text mining. Answer: Text mining can be used to increase cross-selling and up-selling by analyzing the unstructured data generated by call cente rs. Text generated by call-center notes as well as transcriptions of voice conversations with customers can be analyzed by text mining algorithms to extract novel, actionable information about customers' perceptions toward a company's products and services. Text mining is valuable for customer relationship management (CRM).Companies can use text mining to analyze unstructured text data, combined with the relevant structured data extracted from organizational databases, to predict customer perceptions and subsequent purchasing behavior. Diff: 2Page Ref: 200 65) What is the primary purpose of text mining within the context of knowledge discovery? Answer: The primary purpose of text mining within the context of knowledge discovery is to process unstructured (textual) data along with structured data, if relevant to the problem, to extract meaningful and actionable patterns for better decision making.Diff: 1Page Ref: 206 66) Diagram and explain the three-step text mining process. Answer: See Figure 5. 5 in the textbook. Diff: 2Page Ref: 207 67) List two options for managing or reducing the dimensionality (size) of the term-document matrix (TDM). Answer: â⬠¢A domain expert goes through the list of terms and eliminates those that do not make much sense for the context of the study. â⬠¢Eliminate terms with very few occurrences in very few documents. â⬠¢Transform the matrix using singular value decomposition. Diff: 3Page Ref: 210 8) What are three of the challenges for effective and efficient knowledge discovery posed by the Web? Answer: The Web is too big for effective data mining. Because of the sheer size of the Web, it is not feasible to set up a data warehouse to replicate, store, and integrate all of the data on the Web, making data collection and integration a challenge. The Web is too complex. The complexity of a Web page is far greater than a page in a traditional text document collection. Web pages lack a unified structure.The Web is too dynamic. The Web is a highly dynamic information source. Not only does the Web grow rapidly, but its content is constantly being updated. The Web is not specific to a domain. The Web serves a broad diversity of communities and connects billions of workstations. Web users have very different backgrounds, interests, and usage purposes. The Web has everything. Only a small portion of the information on the Web is truly relevant or useful to someone or some task. Diff: 2Page Ref: 217 9) Define the three main areas of Web mining and each area's source of information. Answer: Web content mining refers to the extraction of useful information from Web pages. Source: unstructured textual content of the Web pages, usually in HTML format. Web structure mining is the process of extracting useful information from the links embedded in Web documents. Source: the URL links contained in the Web pages. Web usage mining is the extraction of useful information from data generated through Web page visits and tr ansactions.Source: the detailed description of a Web site's visits. Diff: 2Page Ref: 218 70) List three business applications of Web mining. Answer: 1. Determine the lifetime value of clients. 2. Design cross-marketing strategies across products. 3. Evaluate promotional campaigns. 4. Target electronic ads and coupons at user groups based on user access patterns. 5. Predict user behavior based on previously learned rules and users' profiles. 6. Present dynamic information to users based on their interests and profiles. Diff: 2Page Ref: 221
Tuesday, January 7, 2020
Analysis Of The Pathophysiological Framework Of Dilated...
Dilated Cardiomyopathy Cardiomyopathy is the deterioration of muscles within the heart which in turn causes the heart to become thick, rigid or enlarged; this physiological change causes decreased contractility and may lead to arrhythmias or heart failure (VanMeter and Hubert, 2013). In the case study, the client is a seven-year-old girl from Chetwynd who is recently diagnosed with dilated cardiomyopathy. When she was ten months old, she underwent a heart transplant for her hypoplastic left heart syndrome. Hypoplastic left heart syndrome is a complex and rare heart defect that is congenital, or present at birth, in which the left side of the heart is severely underdeveloped. The left ventricle is not functional and therefore the left sideâ⬠¦show more contentâ⬠¦The rapid degeneration of myocardial fibers and diffuse inflammation lead to ventricular dilation and hypertrophy which cause atrial enlargement and stasis of blood in the left ventricle (Park, 2008). The enlargement of the remaining heart chambers is mainly due to left ventricular failure, but it may also be secondary to the primary cardiomyopathic process. Dilated cardiomyopathy is associated with both systolic and diastolic dysfunctions, with decreased systolic function being the predominant abnormality (Parker, 2008). This dysfunction leads to decreased contractility and general contractile dysfunction (Parker, 2008). Progressive dilation can lead to significant mitral and tricuspid regurgitation, which may further decrease the cardiac output and increase end-systolic volumes and ventricular wall stress. In turn, this leads to further dilation and myocardial dysfunction (Friedberg, 2008). Dilated cardiomyopathy is the most common type of heart muscle disease in pediatrics (Chow, Ateah, Scott, Ricci, Kyle, 2013). Dilated cardiomyopathy can be a life threatening condition and can decrease life expectancy if severe damage occurs. Currently, the five-year survival rate for children diagnosed with dilated cardiomyopathy is between forty and eighty percent. The survival rate decreases if they child is diagnosed at five years or older (Friedberg, 2008). Diagnosis Diagnosis methods
Subscribe to:
Posts (Atom)