Explore BrainMass

Explore BrainMass

    Data Analysis

    In the modern world, where computers get faster every year and storage space, smaller and cheaper, it is easy to accumulate data. Companies are increasingly able to hold on to every piece of information gained from their customers indefinitely in the hopes of finding out how to become more profitable - when to put certain items or services on sale, how often someone needs that item or service, and even more specific things like how people pay for different things and what part of the premises sees the most action. It has begun to seem like any practical question can be answered if one collects enough pertinent data, but having and understanding data are two entirely different things.

    Screenshot of the popular data analytics program KNIME.

    Data analysis is the method of taking a questions and raw data and processing that data in a way that results in a greater understanding of the question, and hopefully an answer. There are myriad ways of doing this, but with potential terabytes of data, one needs to pick the most intelligent and efficient methods of analysis while being aware of potential biases in the data that will skew results. Models, data clustering and pattern matching are extremely common tools for mining in this area, as the easiest way to analyse data is often to look for patterns and trends in it. There are also many excellent tools that have been built to help analysts, including R and KNIME to prevent us from "drowning in information but [being] starved for knowledge" as John Naisbitt cautioned.

    © BrainMass Inc. brainmass.com April 27, 2024, 3:12 am ad1c9bdddf

    BrainMass Categories within Data Analysis

    Data Clustering

    Solutions: 32

    Data clustering revolves around making observations and drawing conclusions from grouped clumps of similar data points.

    Numerical Analysis

    Solutions: 15

    Numeric approximations for models, etc. that allow us to analyze phenomena without needing complete precision

    Genetic Approximation

    Solutions: 29

    Genetic approximation algorithms mimic natural selection with their instructions in order to 'evolve' ever more accurate solutions.

    Pattern Matching

    Solutions: 25

    The process of checking untested data against an expected pattern in their properties for matches and discrepancies.

    BrainMass Solutions Available for Instant Download

    Program to Analyze Distance Traveled by Basketball Team

    You are performing some analysis on a basketball league, and would like to know the relationship between how far a team has to travel from home and how often it wins. You have the following two files, which are dos-pipe (|) delimited containing data with row headers: Team File: Fields are TeamID, TeamName, TeamArenaAddre

    Excel Spreadsheet Applications

    1. Identify an example of a business related report created with MS Excel. Attach a sample of the report in an MS Excel file. 2. Describe the purpose of this report. Highlight and explain at least 3 capabilities of MS Excel used in this report. In your explanation you may highlight cells containing formulas or functions withi

    Expanding Database Design

    Assignment Instructions: Given the following scenario: Create a preliminary table and field list, assign the primary keys for each table, and create a field specification using the Excel® worksheet template "FieldSpecs.xlxs" (also attached). Remember there are some possible inconsistencies in language due to the interview pro

    Data Mining and Weighing Onion Bags

    A packaging machine is used to put onions into 5-pound bags. In fact the weights vary according to the normal distribution with expected value of average µ = 5.01 lb and standard deviation s = 0.05 lb. Assume that 95% of bags with weight closest to µ is considered as normal. What would be the weight range of normal onion bags?

    Inheritance and copy constructor.

    Problem 1. You are to design an abstract class called Employee whose members are as given below (make them protected): Data members: char *name long int ID Two constructors: A Default constructor // initialize data members to the default value and a copy constructor Methods: setPerson (char *n, long int id) //allows us