wordlist.c Fri Feb 02 10:30:50 2018 1
/*
* As shown during lecture - 2 Feb 2018
*
* With slight tweak to include prototype for compare function
* used by qsort.
*/
#include <string.h>
#include <stdio.
CSC 370 - Spring 2018
Relational Databases
Bill Bird
Department of Computer Science
University of Victoria
January 9, 2018
University of Victoria - CSC 370 - Spring 2018
1
Programs and Data (1)
Data
D
Decision Trees
Administrivia
Project Pitches Jan 17
If you cant make your lab for your pitch, contact Cole
[email protected]
Last Class
(Adapted from Leslie Kaelbling's example in the MIT courseware)
Decision Trees 3
Classification vs Regression
So far we have described classification
predicting one of a discrete set of labels
play tennis? yes/no
Neighbors behavior: walk/drive
Car type: luxur
Decision Trees (2)
Many of these slides courtesy of
Alex Thomo (thanks!)
Administrivia
Identifying promising projects
Is this project easy to distribute amongst a team?
in groups of 5, you must min
CSC 370 - Spring 2018
Normalization I
Bill Bird
Department of Computer Science
University of Victoria
January 12, 2018
University of Victoria - CSC 370 - Spring 2018
1
Redundancies and Anomalies (1)
T
Introduction to Data Mining
Instructor: Dr. Alona Fyshe
Alona Fyshe
A lawn
A fish
Me
From Edmonton, AB
Most recently lived in Pittsburgh, PA
About Me
Alona Fyshe
Email: afyshe at uvic.ca
Office: ECS
'
purpose
Read a from stdin: a shape consisting of a list of lines.
Write to stdout number_of_rings rings.
Each ring consists of the lines in the shape arranged in a ring around the
origin.
preconditi
import math
'
Purpose
Provide an exception class for Point and Line.
Exceptions
None
Preconditions
Message is a string.
'
class Error(Exception):
def _init_(self, message):
self.message = message
'
Pu
import sys
import math
import Line_Point
'
purpose
write to stdout a regular polygon with s sides and first vertex at (x0,y0)
preconditions
None
'
# process the command line arguments
if len(sys.argv)
import sys
import math
import Line_Point
'
purpose
write to stdout a binary tree with height n, branching angle a and
branching scale factor f
preconditions
n is a positive integer
a and f are floatin
SEng 474 / CSc 578D
Data Mining Spring 2016
Assignment 2
Due: February 17th NO LATE ASSIGNMENTS ACCEPTED.
Be aware: no late assignments will be accepted so we can release the key on the due
date to he
SEng 474 / CSc 578D
Data Mining Spring 2016
Assignment 2 - Solutions
No marks given for answers only.
1. (SEng 474 and CSc 578D: 10 points)
a) (2 points)
Assume the data is equally split between the t
SEng 474 / CSc 578D Data Mining Spring 2016
Assignment 3
Due: March 23, 2016
Hand in a paper copy for questions 1 to 4 in class.
Submit code and written answer for question 5 via ConneX
Q 1-4: due 9:2
Assignment 1. Solutions
1. Construct the root and the first level of a decision tree for the contact lenses data. Show
the details of your construction. Then, check your solution with Weka (the data f
Assignment 2 (Due Feb 20, 11:55 AM)
1. (10 pt) Implement the perceptron algorithm in Matlab/Octave or Python (so that you can
perform matrix/vector operations with ease). Run it on the bankruptcy data
SENG 474 / CSC 578 D Spring 2017 Midterm (Please return the question sheet)
Student ID:
Question 1 (5 points)
Below are given 14 data instances regarding animals. Consider the type attribute as the
cl
SENG 474, CSC 578D: Data Mining: Spring 2017
Assignment 1. Due: Jan 31, 2017, 11:55 pm
1. (4 points) Construct the root and the first level of a decision tree for the contact lenses data.
Use the ID3
SEng 474 / CSc 578D
Data Mining Spring 2016
Assignment 1 - Solutions
1.
a) (SEng 474: 20 points; CSc 578D: 15 points)
Construct the root and the first level of a decision tree for the contact lenses d
Question 1 (5 points)
Note that we get this solution regardless of the base of logarithms. This is because to
convert to log base 2, we just need to divide by a constant factor: log_2 <your base>. My
SEng 474 / CSc 578D
Data Mining Spring 2016
Assignment 1
Due: February 3rd
Hand in a paper copy for questions 1 to 3 in class.
Submit code for question 4 through ConneX before 11:55pm.
Different marki
SENG 360 Assignment 3 - Cryptography
To be carried out in groups of 2-3 students.
Objective
Implement secure Instant Messaging (IM) between a client and a server program.
Details
IM software offe
SENG 360 Assignment 2 - Protocols
To be carried out individually
Part A Key Strength and Attack Analysis
A car locking system consists of an engine management system E which shares a key K with a