Need help? We are here

# Check the attachmentsPlease read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the as

Check the attachments

## Please read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 5 Here”.

Guidelines:

· Use only R for this assignment

· Submit both R code and Report on findings

· Work is to be done individually for this assignment

1. In this problem, you will generate simulated data, and then perform K-means clustering on the data.

1.1 Generate a simulated data set with 30 observations in each of two classes (i.e. 60 observations in total), and 2 variables.

Code Hint: The first four lines of codes should be:

set.seed(2) x=matrix(rnorm(60*2), ncol=2) x[1:30,1]=x[1:30,1]+3

x[1:30,2]=x[1:30,2]-4

1.2 Perform K-means clustering of the observations with K = 2. Plot the data with each observation colored according to its cluster assignment (nstart=20). Take a screenshot of your plot. What is the total within-cluster sum of squares?

1.3 Perform K-means clustering with K = 3. Plot the data with each observation colored according to its cluster assignment (nstart=20). Take a screenshot of your plot. What is the total within-cluster sum of squares?

1.4 Now perform K-means clustering with K = 4. Plot the data with each observation colored according to its cluster assignment (nstart=20). Take a screenshot of your plot. What is the total within-cluster sum of squares?

1.5 Using the scale () function, perform K-means clustering with K = 2 on the data after scaling each variable to have standard deviation one. Take a screenshot of your plot. What is the total within-cluster sum of squares now? How do these results compare to those obtained in (2)?

1

2. Consider the USArrests data. We will now perform hierarchical clustering on the states. USArrests dataset is part of the base R package. You do not need to load any libraries.

2.1 Plot the hierarchical clustering dendrogram using complete linkage clustering with Euclidean distance as the dissimilarity measure. Take a screenshot of your plot.

2.2 Cut the dendrogram at a height that results in three distinct clusters. Which states belong to which clusters? You need to provide state names for each cluster (e.g. Cluster 1 has Alabama, Alaska,…).

2.3 Hierarchically cluster the states using complete linkage and Euclidean distance, after scaling the variables to have standard deviation one.

a) Take a screenshot of your plot.

b) What effect does scaling the variables have on the hierarchical clustering obtained?

c) In your opinion, should the variables be scaled before the inter-observation dissimilarities are computed? Provide a justification for your answer.

2.4 After scaling the variables to have standard deviation one, plot the hierarchical clustering dendrogram using average linkage clustering with Euclidean distance as the dissimilarity measure. Take a screenshot of your plot.

2.5 After scaling the variables to have standard deviation one, plot the hierarchical clustering dendrogram using single linkage clustering with Euclidean distance as the dissimilarity measure. Take a screenshot of your plot.

What to submit:

1.
R code.

a. Should include all the code to accomplish the tasks.

b. Clear and concise comments to indicate what part of the assignment each code chunk pertains to.

c. Code should be easily readable.

d. Filename should be in the format of: LastnameFirstname_A5.R

2.
Report.

a. Take screenshots of your outputs in R Studio and answer all the questions.

b. Submit in PDF format.

c. Answers questions clearly and concisely.

d. Includes appropriate plots. Make sure the plots are properly labeled.

e. The assignment will be graded on the correctness of the answers, comprehensiveness of the analysis, clarity of results’ presentation and neatness of the report.

Order a Similar Paper and get 15% Discount on your First Order

## Related Questions

### Complete the assignment instructions in the Assignment 1 — Working with Codes document.  HAVING FUN WITH CODES

Complete the assignment instructions in the Assignment 1 — Working with Codes document.  HAVING FUN WITH CODES 1. Read about Cesar Ciphers. Visit the Cryptography Tutorial and decode the three strings shown. Cut and paste the decoded answer and record the value of the shift key for each. 1a ___________________ _____ 1b

### 1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating

1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating controls and provide a solution for the scenario: You head up a small team of IT and cyber professionals tasked with ensuring network security. A recent malware has come to

### culture of innovation in IT operations and integrate IT innovation

culture of innovation in IT operations and integrate IT innovation

### file attachedRead “Case 10.3: Amazon” and write an essay that answers the following questions: 1. What is the importance of

file attached Read “Case 10.3: Amazon” and write an essay that answers the following questions: 1. What is the importance of logistics in Amazon’s business model? 2. How has Amazon used AI and machine learning to improve its supply chain management and customer experience? 3. What are the benefits of

### Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network

Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network troubleshooting. Instructions: Responses should include direct questions.

### Instructions:Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to

Instructions: Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to secure the network. Describe the importance of having privileged and non-privileged states within an organization. List any observations, tips or questions about this lab that would prove helpful

### The case study and the instruction to the assignment is attached. Winter, 2021 IFSM301Case Study: GG Freightways (GGFRT) GGFRT is a regional

The case study and the instruction to the assignment is attached.  Winter, 2021 IFSM301 Case Study: GG Freightways (GGFRT) GGFRT is a regional transportation and distribution company in operation for over 30 years. The company serves major cities in the southwestern region of the United States. Their headquarters (1), terminals/warehouses

### Assignment 1: Conceptual Modelling & Logical DB Design

Assignment 1: Conceptual Modelling & Logical DB Design

### Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting

Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting address (in hex) and an ending address (in hex). Your program will then output the contents of memory (in hex) between the provided ranges (inclusive).

### Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

### 3/25/24, 9:24 PM Assignment Information1/4IT 200 Project One Technology Hardware and Software Guidelines and RubricCompetencyIn this

3/25/24, 9:24 PM Assignment Information 1/4 IT 200 Project One Technology Hardware and Software Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competency: Describe the technologies, hardware, and software used within the information technology �eld Scenario You are working as a contracted information

### check the attachementsPlease read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to

check the attachements Please read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 4 Here” Guidelines: · Use only R for this

### Check the attachments Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to

Check the attachments  Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 3 Here”. Guidelines: · Use R only for

### · A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information

· A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information provided. Then read 5 crucial elements in conducting a crisis audit reading in this link: After summarizing the company’s situation, using the 5 elements provided, explain

### Networking Project FeedbackI recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on

Networking Project Feedback I recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on the MAC sublayer that needs elaborate research to pull up the infographic and the video. These are not just pictures but gateways to learning. Be creative and

### Assignment Content 1. Top of FormIn this final case sudy, our focus will be in development of an effective crisis plan. Again, you

Assignment Content 1. Top of Form In this final case sudy, our focus will be in development of an effective crisis plan. Again, you can use the hyperlink provided in the reading to prepare your response on how well KFC responded to (or handled) this crisis. KFC and the shortage

### Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland:

Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland: Springer International Publishing.

### Dynamic Programming for partation and  backtracing CSE 3318 Lab Assignment 3 Due March 27 Goal: 1. Understanding of dynamic programming. 2.

Dynamic Programming for partation and  backtracing  CSE 3318 Lab Assignment 3 Due March 27 Goal: 1. Understanding of dynamic programming. 2. Understanding of subset sums. Requirements: 1. Design, code, and test a C program that uses dynamic programming to partition (if possible) a sequence of n positive integers into three