Data mining| Computer Science

Data mining| Computer Science

https://www.seu.edu.sa/sites/ar/SitePages/images/logo.png

College of Computing and Informatics

1 Mark Learning Outcome(s): LO-2,3Question One
a) What are outliers? List four applications of outlier detection.

b) What are the challenges of outlier detection?

1 Mark Learning Outcome(s): LO- 2, 3Question Two
a) How does PAM (K-medoids) form clusters; how does DBSCAN form clusters?

b) Assume you apply DBSCAN to the same dataset, but the examples in the dataset are sorted differently. Will DBSCAN always return the same clustering for different orderings of the same dataset? Give reasons for your answer.

1 Mark Learning Outcome(s): LO-2, 3Question Three
Measuring geodesic distance for the graph G in given figure, calculate the following:

i. Eccentricity

ii. Radius

iii. Diameter

iv. Peripheral vertex

A D E C B F

1 Mark Learning Outcome(s): LO-2Question Four
Why is it often necessary to do constraint-based clustering? Describe the terms hard constraint and soft constraint.

Learning Outcome(s): LO-2, 3

Order from us and get better grades. We are the service you have been looking for.