1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
7

Univariate linear regression Note: Solutions to this problem must follow the method described in class and the linear regression

handout. There is some flexibility in how your solution is coded, but you may not use special functions that automatically perform linear regression for you. Load in the BodyBrain Weight.csv dataset. Perform linear regression using two different models: M1: brain_weight = w0 + w1 x body_weight M2: brain_weight = w0 + w1 x body_weight + w2 x body_weight2
a. For each model, follow the steps shown in class to solve for w. Report the model, including w values and variable names for both models.
b. Use subplots to display two graphs, one for each model. In each graph, include: • Labeled x and y axes • Title • Scatterplot of the dataset • A smooth line representing the model
c. For each model, calculate the sum squared error (SSE). Show your 2 SSE values together in a bar plot.
d. Which model do you think is better? Why? Is there a different model that you think would better represent the data?
Body weight (kg) Brain weight (g)
0.023 0.4
0.048 0.33
0.075 1.2
0.12 1
0.122 3
0.2 5
0.28 1.9
0.55 2.4
0.75 12.3
0.785 3.5
0.93 3.5
1.04 5.5
1.35 8.1
1.41 17.5
2.5 12.1
3 25
3.3 25.6
3.6 21
4.288 39.2
5.3 41.6
6.8 179
10 115
10.55 179.5
27.66 115
35 56
36.33 119.5
52.16 440
55.5 175
60 81
62 1320
85 325
93 225
100 157
110 288
110 442
187.1 419
192 180
207 406
250 334
465 423
480 712
521 655
529 680
1400 590
2547 4603
6654 5712

Computers and Technology
1 answer:
salantis [7]3 years ago
4 0

Answer:

regression line is  Y  =    124.9281    +    0.9370    *x

SSE=    (SSxx * SSyy - SS²xy)/SSxx =     7317401.270      

Explanation:

See the attached image file

You might be interested in
What are three ways digital identity is created and kept up? (open answer)
Anna007 [38]

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

6 0
2 years ago
How is ict integrated into marketing<br>​
Aleks04 [339]

Answer: The utilize of great ICT moreover moves forward client administrations and client request. From database advancement, site plan to showcase investigate, interpretation program, coordinate mail showcasing and preparing, the application of ICT is basic for a financial victory. The web is one of the ways in which media companies / businesses publicize.

Explanation:

5 0
1 year ago
What is a benefit of the intranet?
olasank [31]
Hello there.

What is a benefit of the internet?

Access and share data info fast and safe.
8 0
3 years ago
Read 2 more answers
What does DOS stand for?
anygoal [31]

Answer:

Disk Operating System

Explanation:

"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."

5 0
3 years ago
I need help 50 points and brainless if you answer
nata0808 [166]

Answer:

50

var X gets passed into the rectangle function, which I assume would set the x and y coordinates to what the var's have already been set to.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Electronic ledger that tracks mathematical data
    15·1 answer
  • A cell reference that has only one $ is referred to as a(n) ____ cell reference. alternative mixed relative absolute
    7·1 answer
  • Knowing what you know about today’s video games, imagine what it would look like if you had to create a modern-day version of Sp
    6·1 answer
  • Write a program that reads raw data from a file that contains an inventory of items. The items should be sorted by name, and the
    12·1 answer
  • If your computer won't connect to the internet, which of these is most likely to be the problem?
    8·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • 1. Fill in the blanks:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!