(eBook PDF) Handbook of Statistical Analysis and Data Mining Applications 2nd Edition download
(eBook PDF) Handbook of Statistical Analysis and Data Mining Applications 2nd Edition download
https://ebookluna.com/product/ebook-pdf-handbook-of-statistical-
analysis-and-data-mining-applications-2nd-edition/
https://ebookluna.com/download/handbook-of-statistical-analysis-and-
data-mining-applications-ebook-pdf/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-data-mining-and-predictive-
analytics-2nd-edition/
ebookluna.com
https://ebookluna.com/download/predictive-modeling-in-biomedical-data-
mining-and-analysis-ebook-pdf/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-data-mining-for-business-
analytics-concepts-techniques-and-applications-in-r/
ebookluna.com
(eBook PDF) An Introduction to Statistical Methods & Data
Analysis 7th
https://ebookluna.com/product/ebook-pdf-an-introduction-to-
statistical-methods-data-analysis-7th/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-introduction-to-data-mining-
global-edition-2nd-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-data-mining-for-business-
analytics-concepts-techniques-and-applications-with-jmp-pro/
ebookluna.com
ebookluna.com
https://ebookluna.com/product/ebook-pdf-data-mining-concepts-and-
techniques-3rd/
ebookluna.com
vii
CONTENTS
Data Mining With STATISTICA 348 Tutorial I Data Prep 1–2: Data
Conclusion 355 Description
References 356
ROBERTA BORTOLOTTI, MSIS, CBAP
Further Reading 357
The Problem of Significance in Traditional P-Value Ethics and Data Science for the Virtues of Personal
Statistical Analysis 754 Life (Existential-Motivational) 769
USUAL Data Mining/Predictive Analytic Combination: Right Standards, Right Goals,
Performance Measures—Terminology 759 and Personal Virtue (Normative, Situational,
Unique Ways to Test Accuracy (“Significance”) Existential) 770
of Machine Learning Predictive Models 760 Michael Sandel on “Doing The Right Thing” With
Compare Predictive Model Performance Against Data Analytics 770
Random Results With Lift Charts and Decile Discovering Data Ethics in an “Alignment
Tables 760 Methodology” 771
Evaluate the Validity of Your Discovery With Target References 772
Shuffling 762 Further Reading 772
Test Predictive Model Consistency With Bootstrap
Sampling 763 22. IBM Watson
Postscript 764 Preamble 773
References 765 Introduction 773
What Exactly Is Watson? 773
21. Ethics and Data Analytics Jeopardy! 774
Internal Features of Watson 774
ANDY PETERSON
Application Programming Interfaces (APIs) 776
Preamble 767 Software Development Kits (SDKs) 778
The Birthday Party—A Practical Example for Ethical Some Existing Applications of Watson
Action 767 Techology 778
Academic Secular Ethics 768 Ushering in the Cognitive Era 780
Ethics and Data Science for the Norms of Postscript 780
Government (Deontological-Normative) 769 Reference 781
Ethics and Data Science for the Goals in Business
(Situational-Teleological) 769 Index 783
List of Tutorials on the Elsevier
Companion Web Page
Note: This list includes all the extra tuto- 8. TUTORIAL “W”—Diabetes Control in
rials published with the 1st edition of this Patients [Field: Medical Informatics]
handbook (2009). These can be considered 9. TUTORIAL “X”—Independent
“enrichment” tutorials for readers of this 2nd Component Analysis [Field: Separating
edition. Since the 1st edition of the handbook Competing Signals]
will not be available after the release of the 10. TUTORIAL “Y”—NTSB Aircraft
2nd edition, these extra tutorials are carried Accidents Reports [Field: Engineering—
over in their original format/versions of soft- Air Travel—Text Mining]
ware, as they are still very useful in learning 11. TUTORIAL “Z”—Obesity Control in
and understanding data mining and predic- Children [Field: Preventive Health Care]
tive analytics, and many readers will want to 12. TUTORIAL “AA”—Random Forests
take advantage of them. Example [Field: Statistics—Data Mining]
List of Extra Enrichment Tutorials that 13. TUTORIAL “BB”—Response
are only on the ELSEVIER COMPANION Optimization [Field: Data Mining—
web page, with data sets as appropriate, for Response Optimization]
downloading and use by readers of this 2nd 14. TUTORIAL “CC”—Diagnostic Tooling
edition of handbook: and Data Mining: Semiconductor Industry
[Field: Industry—Quality Control]
1. TUTORIAL “O”—Boston Housing
15. TUTORIAL “DD”—Titanic—Survivors
Using Regression Trees [Field:
of Ship Sinking [Field: Sociology]
Demographics]
16. TUTORIAL “EE”—Census Data
2. TUTORIAL “P”—Cancer Gene [Field:
Analysis [Field: Demography—Census]
Medical Informatics & Bioinformatics]
17. TUTORIAL “FF”—Linear & Logistic
3. TUTORIAL “Q”—Clustering of Shoppers
Regression—Ozone Data [Field:
[Field: CRM—Clustering Techniques]
Environment]
4. TUTORIAL “R”—Credit Risk
18. TUTORIAL “GG”—R-Language
using Discriminant Analysis [Field:
Integration—DISEASE SURVIVAL
Financial—Banking]
ANALYSIS Case Study [Field: Survival
5. TUTORIAL “S”—Data Preparation and
Analysis—Medical Informatics]
Transformation [Field: Data Analysis]
19. TUTORIAL “HH”—Social Networks
6. TUTORIAL “T”—Model Deployment
Among Community Organizations
on New Data [Field: Deployment of
[Field: Social Networks—Sociology &
Predictive Models]
Medical Informatics]
7. TUTORIAL “V”—Heart Disease Visual
20. TUTORIAL “II”—Nairobi, Kenya
Data Mining Methods [Field: Medical
Baboon Project: Social Networking
Informatics]
xi
xii LIST OF TUTORIALS ON THE ELSEVIER COMPANION WEB PAGE
This book will help the novice user be- • Asking the wrong question—when
come familiar with data mining. Basically, looking for a rare phenomenon, it may
data mining is doing data analysis (or statis- be helpful to identify the most common
tics) on data sets (often large) that have been pattern. These may lead to complex
obtained from potentially many sources. As analyses, as in item 3, but they may also
such, the miner may not have control of the be conceptually simple. Again, you may
input data, but must rely on sources that have need to take care that you don't overfit
gathered the data. As such, there are prob- the data.
lems that every data miner must be aware of • Don't become enamored with the data.
as he or she begins (or completes) a mining There may be a substantial history from
operation. I strongly resonated to the mate- earlier data or from domain experts that
rial on “The Top 10 Data Mining Mistakes,” can help with the modeling.
which give a worthwhile checklist: • Be wary of using an outcome variable (or
• Ensure you have a response variable and one highly correlated with the outcome
predictor variables—and that they are variable) and becoming excited about the
correctly measured. result. The predictors should be “proper”
• Beware of overfitting. With scads of predictors in the sense that they (a) are
variables, it is easy with most statistical measured prior to the outcome and (b)
programs to fit incredibly complex are not a function of the outcome.
models, but they cannot be reproduced. It • Do not discard outliers without solid
is good to save part of the sample to use justification. Just because an observation
to test the model. Various methods are is out of line with others is insufficient
offered in this book. reason to ignore it. You must check the
• Don't use only one method. Using only circumstances that led to the value. In
linear regression can be a problem. any event, it is useful to conduct the
Try dichotomizing the response or analysis with the observation(s) included
categorizing it to remove nonlinearities and excluded to determine the sensitivity
in the response variable. Often, there are of the results to the outlier.
clusters of values at zero, which messes • Extrapolating is a fine way to go
up any normality assumption. This, of broke; the best example is the stock
course, loses information, so you may market. Stick within your data, and
want to categorize a continuous response if you must go outside, put plenty
variable and use an alternative to of caveats. Better still, restrain the
regression. Similarly, predictor variables impulse to extrapolate. Beware that
may need to be treated as factors rather pictures are often far too simple and
than linear predictors. A classic example we can be misled. Political campaigns
is using marital status or race as a linear oversimplify complex problems (“my
predictor when there is no order. opponent wants to raise taxes”; “my
xiii
xiv FOREWORD 1 FOR 1st EDITION
opponent will take us to war”) when using mean replacement, almost the
the realities may imply we have same set of predictor variables surfaced,
some infrastructure needs that can be but the residual sum of squares was 20.
handled only with new funding or we I then used multiple imputation and
have been attacked by some bad guys. found approximately the same set of
Be wary of your data sources. If you are predictors but had a residual sum of
combining several sets of data, they need squares (median of 20 imputations) of
to meet a few standards: 25. I find that mean replacement is rather
• The definitions of variables that are optimistic but surely better than relying
being merged should be identical. Often, on only complete cases. Using stepwise
they are close but not exact (especially regression, I find it useful to replicate
in metaanalysis where clinical studies it with a bootstrap or with multiple
may have somewhat different definitions imputations. However, with large data
due to different medical institutions or sets, this approach may be expensive
laboratories). computationally.
• Be careful about missing values. Often, To conclude, there is a wealth of material
when multiple data sets are merged, in this handbook that will repay study.
missing values can be induced: one
variable isn't present in another data set; Peter A. Lachenbruch
what you thought was a unique variable Oregon State University, Corvallis, OR,
name was slightly different in the two United States
sets, so you end up with two variables American Statistical Association,
that both have a lot of missing values. Alexandria, VA, United States
• How you handle missing values can be Johns Hopkins University, Baltimore,
crucial. In one example, I used complete MD, United States
cases and lost half of my sample; all UCLA, Los Angeles, CA, United States
variables had at least 85% completeness, University of Iowa, Iowa City, IA,
but when put together, the sample lost United States
half of the data. The residual sum of University of North Carolina, Chapel
squares from a stepwise regression was Hill, NC, United States
about 8. When I included more variables
Foreword 2 for 1st Edition
xv
xvi FOREWORD 2 FOR 1st EDITION
However, the book is best read a few the excellent “History of Statistics and Data
chapters at a time while actively doing Mining” chapter and chapters 16, 17, and
the data mining rather than read cover to 18. These are broadly applicable and should
cover (a daunting task for a book this size). be read by even the most experienced data
Practitioners will appreciate tutorials that miners.
match their business objectives and choose The Handbook of Statistical Analysis and
to ignore other tutorials. They may choose Data Mining Applications is an exceptional
to read sections on a particular algorithm to book that should be on every data miner's
increase insight into that algorithm and then bookshelf or, better yet, found lying open
decide to add a second algorithm after the next to their computer.
first is mastered. For those new to a partic-
ular software tool highlighted in the tutori- Dean Abbott
als section, the step-by-step approach will Abbott Analytics, San Diego, CA,
operate much like a user's manual. Many United States
chapters stand well on their own, such as
Preface
xvii
xviii PREFACE
turn the key in the ignition, step on the gas is enough here to permit you to construct
and the brake at the right times, and turn the “smart enough” business operations with a
wheel to change direction in a safe manner, relatively small amount of the right informa-
and voilà, you are an expert user of the very tion. James Taylor developed this concept
complex technology under the hood. The for automating operational decision-making
other half of the story is the instruction man- in the area of enterprise decision man-
ual and the driver's education course that agement (Raden and Taylor, 2007). Taylor
help you to learn how to drive. recognized that companies need decision-
This book provides the instruction man- making systems that are automated enough
ual and a series of tutorials to train you how to keep up with the volume and time-critical
to do data mining in many subject areas. We nature of modern business operations.
provide both the right tools and the right These decisions should be deliberate, pre-
intuitive explanations (rather than formal cise, and consistent across the enterprise;
mathematical definitions) of the data mining smart enough to serve immediate needs
process and algorithms, which will enable appropriately; and agile enough to adapt
even beginner data miners to understand the to new opportunities and challenges in the
basic concepts necessary to understand what company. The same concept can be applied
they are doing. In addition, we provide many to nonoperational systems for customer re-
tutorials in many different industries and lationship management (CRM) and market-
businesses (using many of the most common ing support. Even though a CRM model for
data mining tools) to show how to do it. cross sell may not be optimal, it may enable
several times the response rate in prod-
uct sales following a marketing campaign.
OVERALL ORGANIZATION Models like this are “smart enough” to drive
OF THIS BOOK companies to the next level of sales. When
models like this are proliferated through-
We have divided the chapters in this book out the enterprise to lift all sales to the next
into four parts to guide you through the as- level, more refined models can be developed
pects of predictive analytics. Part I covers the to do even better. This e nterprise-wide “lift”
history and process of predictive analytics. in intelligent operations can drive a com-
Part II discusses the algorithms and methods pany through evolutionary rather than rev-
used. Part III is a group of tutorials, which olutionary changes to reach long-term goals.
serve in principle as Rome served—as the Companies can leverage “smart enough”
central governing influence. Part IV presents decision systems to do likewise in their pur-
some advanced topics. The central theme of suit of optimal profitability in their business.
this book is the education and training of Clearly, the use of this book and these tools
beginning data mining practitioners, not the will not make you experts in data mining.
rigorous academic preparation of algorithm Nor will the explanations in the book per-
scientists. Hence, we located the tutorials in mit you to understand the complexity of the
the middle of the book in Part III, flanked by theory behind the algorithms and methodol-
topical chapters in Parts I, II, and IV. ogies so necessary for the academic student.
This approach is “a mile wide and an inch But we will conduct you through a relatively
deep” by design, but there is a lot packed into thin slice across the wide practice of data
that inch. There is enough here to stimulate mining in many industries and disciplines.
you to take deeper dives into theory, and there We can show you how to create powerful
PREFACE xix
predictive models in your own organization Coauthor Gary Miner wishes to thank his
in a relatively short period of time. In addi- wife, Linda A. Winters-Miner, PhD, who has
tion, this book can function as a springboard been working with Gary on similar books over
to launch you into higher-level studies of the the past 30 years and wrote several of the tu-
theory behind the practice of data mining. torials included in this book, using real-world
If we can accomplish those goals, we will data. Gary also wishes to thank the following
have succeeded in taking a significant step in people from his office who helped in various
bringing the practice of data mining into the ways, including Angela Waner, Jon Hillis, Greg
mainstream of business analysis. Sergeant, and Dr. Thomas Hill, who gave per-
The three coauthors could not have done mission to use and also edited a group of the
this book completely by themselves, and tutorials that had been written over the years
we wish to thank the following individuals, by some of the people listed as guest authors in
with the disclaimer that we apologize if, by this book. Dr. Dave Dimas, of the University of
our neglect, we have left out of this “thank- California—Irvine, has also been very helpful
you list” anyone who contributed. in providing suggestions for enhancements for
Foremost, we would like to thank ac- this second edition—THANK YOU DAVE !!!
quisitions editor (name to use?) and others Without all the help of the people men-
(names). Bob Nisbet would like to honor tioned here and maybe many others we failed
and thank his wife, Jean Nisbet, PhD, who to specifically mention, this book would never
blasted him off in his technical career by re- have been completed. Thanks to you all!
typing his PhD dissertation five times (be-
fore word processing) and assumed much
of the family's burdens during the writing Bob Nisbet
of this book. Bob also thanks Dr. Daniel B. Gary Miner
Botkin, the famous global ecologist, for in- Ken Yale
troducing him to the world of modeling and
exposing him to the distinction between
viewing the world as machine and viewing Reference
it as organism. And thanks are due to Ken Raden, N., Taylor, J., 2007. Smart Enough Systems: How to
Reed, PhD, for inducting Bob into the prac- Deliver Competitive Advantage by Automating Hidden
Decisions. Prentice Hall, NJ, ISBN: 9780132713061.
tice of data mining.
Introduction
Often, data analysts are asked, “What very different ways of arriving at the same
are statistical analysis and data mining?” In conclusion, a decision. We will introduce
this book, we will define what data mining some basic analytic history and theory in
is from a procedural standpoint. But most Chapters 1 and 2.
people have a hard time relating what we The basic process of analytic modeling is
tell them to the things they know and under- presented in Chapter 3. But it may be diffi-
stand. Before moving on into the book, we cult for you to relate what is happening in
would like to provide a little background for the process without some sort of tie to the
data mining that everyone can relate to. The real world that you know and enjoy. In many
Preface describes the many changes in ac- ways, the decisions served by analytic mod-
tivities related to data mining since the first eling are similar to those we make every day.
edition of this book was published in 2009. These decisions are based partly on patterns
Now, it is time to dig deeper and discuss the of action formed by experience and partly by
differences between statistical analysis and intuition.
data mining (aka predictive analytics).
Statistical analysis and data mining are PATTERNS OF ACTION
two methods for simulating the unconscious
operations that occur in the human brain to A pattern of action can be viewed in
provide a rationale for decision-making and terms of the activities of a hurdler on a
actions. Statistical analysis is a very directed race track. The runner must start success-
rationale that is based on norms. We all think fully and run to the first hurdle. He must
and make decisions on the basis of norms. decide very quickly how high to jump to
For example, we consider (unconsciously) clear the hurdle. He must decide when and
what the norm is for dress in a certain situa- in what sequence to move his legs to clear
tion. Also, we consider the acceptable range the hurdle with minimum effort and with-
of variation in dress styles in our culture. out knocking it down. Then, he must run
Based on these two concepts, the norm and a specified distance to the next hurdle and
the variation around that norm, we render do it all over again several times, until he
judgments like “that man is inappropriately crosses the finish line. Analytic modeling is
dressed.” Using similar concepts of mean a lot like that.
and standard deviation, statistical analy- The training of the hurdler's “model” of
sis proceeds in a very logical way to make action to run the race happens in a series of
very similar judgments (in principle). On operations:
the other hand, data mining learns case by
case and does not use means or standard • Run slow at first.
deviations. Data mining algorithms build • Practice takeoff from different positions
patterns, clarifying the pattern as each case to clear the hurdle.
is submitted for processing. These are two • Practice different ways to move the legs.
xxi
xxii INTRODUCTION
• Determine the best ways to do each activity. two classes (for dichotomous keys) and those
• Practice the best ways for each activity who don't. Along with this joke is a similar
over and over again. recognition from the outside that taxono-
mists are divided also into two classes: the
This practice trains the sensory and motor
“lumpers” (who combine several species into
neurons to function together most efficiently.
one) and the “splitters” (who divide one spe-
Individual neurons in the brain are “trained”
cies into many). These distinctions point to
in practice by adjusting signal strengths and
a larger dichotomy in the way people think.
firing thresholds of the motor nerve cells. The
In ecology, there used to be two schools
performance of a successful hurdler follows
of thought: autoecologists (chemistry, phys-
the “model” of these activities and the process
ics, and mathematics explain all) and the
of coordinating them to run the race. Creation
synecologists (organism relationships in
of an analytic “model” of a business process to
their environment explain all). It wasn't until
predict a desired outcome follows a very simi-
the 1970s that these two schools of thought
lar path to the training regimen of a hurdler. We
learned that both perspectives were needed
will explore this subject further in Chapter 3
to understand the complexities in ecosys-
and apply it to develop a data mining process
tems (but more about that later). In business,
that expresses the basic activities and tasks per-
there are the “big picture” people versus
formed in creating an analytic model.
“detail” people. Some people learn by fol-
lowing an intuitive pathway from general to
HUMAN INTUITION specific (deduction). Often, we call them “big
picture” people. Other people learn by fol-
In humans, the right side of the brain is lowing an intuitive pathway from specific to
the center for visual and esthetic sensibil- general (inductive). Often, we call them “de-
ities. The left side of the brain is the center tail” people. Similar distinctions are reflected
for quantitative and time-regulated sensi- in many aspects of our society. In Chapter 1,
bilities. Human intuition is a blend of both we will explore this distinction to a greater
sensibilities. This blend is facilitated by the depth in regards to the development of sta-
neural connections between the right side tistical and data mining theory through time.
of the brain and the left side. In women, the Many of our human activities involve
number of neural connections between the finding patterns in the data input to our sen-
right and left sides of the brain is 20% greater sory systems. An example is the mental pat-
(on average) than in men. This higher con- tern that we develop by sitting in a chair in
nectivity of women's brains enables them to the middle of a shopping mall and making
exercise intuitive thinking to a greater extent some judgment about patterns among its cli-
than men. Intuition “builds” a model of re- entele. In one mall, people of many ages and
ality from both quantitative building blocks races may intermingle. You might conclude
and visual sensibilities (and memories). from this pattern that this mall is located in
an ethnically diverse area. In another mall,
you might see a very different pattern. In
PUTTING IT ALL one mall in Toronto, a great many of the
TOGETHER stores had Chinese titles and script on the
windows. One observer noticed that he was
Biological taxonomy students claim (in the only non-Asian seen for a half hour. This
jest) that there are two kinds of people in led to the conclusion that the mall catered
taxonomy—those who divide things up into to the Chinese community and was owned
INTRODUCTION xxiii
(probably) by a Chinese company or person. of the model. We will discuss this approach in
Statistical methods employed in testing this more detail in Chapter 1. Data mining doesn't
“hypothesis” would include the following: start with a model; it builds a model with the
data. Thus, statistical analysis uses a model to
• Performing a survey of customers to gain
characterize a pattern in the data; data mining
empirical data on race, age, length of time
uses the pattern in the data to build a model.
in the United States, etc.
This approach uses deductive reasoning,
• Calculating means (averages) and
following an Aristotelian approach to truth.
standard deviations (an expression of the
From the “model” accepted in the beginning
average variability of all the customers
(based on the mathematical distributions as-
around the mean).
sumed), outcomes are deduced. On the other
• Using the mean and standard deviation
hand, data mining methods discover patterns
for all observations to calculate a metric
in data inductively, rather than deductively,
(e.g., student's t-value) to compare with
following a more Platonic approach to truth.
standard tables.
We will unpack this distinction to a much
• If the metric exceeds the standard table
greater extent in Chapter 1.
value, this attribute (e.g., race) is present
Which is the best way to do it? The an-
in the data at a higher rate than expected
swer is it depends. It depends on the data.
at random.
Some data sets can be analyzed better with
More advanced statistical techniques can statistical analysis techniques, and other data
accept data from multiple attributes and sets can be analyzed better with data mining
process them in combination to produce a techniques. How do you know which ap-
metric (e.g., average squared error), which proach to use for a given data set? Much ink
reflects how well a subset of attributes (se- has been devoted to paper to try to answer
lected by the processing method) predict that question. We will not add to that effort.
desired outcome. This process “builds” an Rather, we will provide a guide to general an-
analytic equation, using standard statistical alytic theory (Chapter 2) and broad analytic
methods. This analytic “model” is based on procedures (Chapter 3) that can be used with
averages across the range of variation of the techniques for either approach. For the sake
input attribute data. This approach to finding of simplicity, we will refer to the joint body of
the pattern in the data is basically a deduc- techniques as analytics. In Chapter 4, we in-
tive, top-down process (general to specific). troduce some of the many data preparation
The general part is the statistical model em- procedures for analytics.
ployed for the analysis (i.e., normal paramet- Chapter 5 presents various methods for
ric model). This approach to model building selecting candidate predictor variables to
is very “Platonic.” In Chapter 1, we will ex- be used in a statistical or machine-learning
plore the distinctions between Aristotelian model (differences between statistical and
and Platonic approaches for understanding machine-learning methods of model build-
truth in the world around us. ing are discussed in Chapter 1). Chapter 6 in-
Part I—Introduction and overview of data troduces accessory tools and some advanced
mining processes. features of many data mining tools.
Both statistical analysis and data mining Part II—Basic and advanced algoithms,
algorithms operate on patterns: statistical and their application to common problems.
analysis uses a predefined pattern (i.e., the Chapters 7 and 8 discuss various basic
parametric model) and compares some mea- and advanced algorithms used in data min-
sure of the observations to standard metrics ing modeling applications. Chapters 9 and 10
xxiv INTRODUCTION
discuss the two general types of models, clas- significance, “luck” and ethics in data mining
sification and prediction. Chapter 11 presents applications. The book ends with Chapter 22,
some methods for evaluating and refining which gives an overview of the IBM Watson
analytic models. Chapters 12–15 describe technology, which IBM is trying to leverage
how data mining methods are applied to to solve many analytic problems. It is likely
four common applications. Part III contains that even these new processing strategies are
a group of tutorials that show how to apply not the end of the line in data mining devel-
various data mining tools to solve common opment. Chapter 1 ends with the statement
problems. Part IV discusses various issues of that we will discover increasingly novel and
model complexity, ethical use, and advanced clever ways to mimic the most powerful pat-
processes. Chapter 16 describes the para- tern recognition engine in the universe, the
dox of complexity. Chapter 17 introduces human brain.
the principle of “good-enough” models. One step further in the future could be to
Chapter 18 presents a list of data preparation drive the hardware supporting data mining
activities in the form of a cookbook, along to the level of portable devices like phones
with some caveats of using data mining (pre- and medical data loggers, even to smaller
dictive analytics) methods. Chapter 19 intro- applications in nanotechnology. In power-
duces one of the newest development areas, ful biological quantum computers, the size
deep learning. Some practitioners think that of pin heads (and smaller) may be the next
many data mining analyses will move in the wave of technological development to drive
direction of using deep learning algorithms. data mining advances. Rather than the sky,
Chapters 20 and 21 present various issues of the atom is the limit.
Bob Nisbet
September, 2017
Other documents randomly have
different content
was attached to the battalion commanded by Lieut.-Col. De
Salaberry, and on the latter retiring from the service, Captain
Thomson was promoted to the lieutenant-colonelcy, and given
command of the battalion. He was out during the Fenian troubles,
and subsequently retired retaining his rank. For a number of years
Colonel Thomson has been actively engaged, and still continues, in
the export trade of timber to Britain, etc. He took a prominent part
in the creation of the Union Bank of Canada, at Quebec, as well as in
the formation of several commercial companies connected with river
navigation. At present he is a director of the Union Bank of Canada;
vice-president of the Quebec Steamship Company; president of the
Saguenay & Lake St. John Railway Company; director of the St.
Lawrence Steamboat Company; and director of the Quebec Ferry
Company. A lover of sport Col. Thomson divides his summer vacation
between the secluded salmon pools of the Murray river, leased to
him, and his rustic cottage at Pointe-à-Pic, Murray Bay. Later on one
may meet him scouring for cariboo, with an Indian guide, the snow-
clad heights in rear of Baie St. Paul, known as Les Jardins. In politics
the colonel may be counted among the Liberal-Conservatives, and in
religion an adherent of the Presbyterian church. He is married to
Annie Atkinson, niece of the late Henry Atkinson, of Spencerwood.