1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
2 years ago
11

Polynomial regression A common misconception is that linear regression can only be used to fit a linear relationship. We can fit

more complicated functions of the explanatory variables by defining new features that are functions of the existing features. A common class of models is the polynomial, with a d-th degree polynomial being of the form ĝa(x) = a dvd + ad-1.2d-1 + ... +212 + b with the d + 1 parameters ß = (a_d, ..., a_1, b)^t. So d = 1 corresponds to a line, d = 2 to a quadratic, d = 3 to a cubic, and so forth. In this problem, you will build a series of functions that fit polynomials of different degrees to a dataset. You will then use this to determine the best fit to a dataset by comparing the models from different degrees visually against a scatterplot of the data, and make a prediction for an unseen sample. More specifically: 1. Complete the functions in polyfit.py, which accepts as input a dataset to be fit and polynomial degrees to be tried, and outputs a list of fitted models. The specifications for the main, feature matrix, and least_squares functions are contained as comments in the skeleton code. The key steps are parsing the input data, creating the feature matrix, and solving the least squares equations. 2. Use your completed polyfit.py to find fitted polynomial coefficients for d = 1,2,3,4,5 on the poly.txt dataset. Write out the resulting estimated functions ya(w) for each d. 3. Use the scatter and plot functions in the matplotlib.pyplot module to visualize the dataset and these fitted models on a single graph (i.e., for each x, plot y, ĝi(x), ..., (x)). Be sure to vary colors and include a legend so that each curve can be distinguished. What degree polynomial does the relationship seem to follow? Explain. 4. If we measured a new datapoint x = 2, what would be the predicted value ŷ of y (based on the polynomial identified as the best fit in Question 3)? Note that in this problem, you are not permitted to use the sklearn library. You must use matrix operations in numpy to solve the least squares equations. Once you have completed polyfit.py, if you run the test case provided, it should output: [array( [ -1.15834068, 22.60822925, 100.79905593]), array( [-1.43365571e-02, 1.66770942e+00, -9.05694 import numpy as np #Return fitted model parameters to the dataset at datapath for each choice in degrees. #Input: datapath as a string specifying a .txt file, degrees as a list of positive integers. #Output: paramFits, a list with the same length as degrees, where paramFits[i] is the list of #coefficients when fitting a polynomial of d = degrees[i]. def main(datapath, degrees): paramFits = 1 #fill in #read the input file, assuming it has two columns, where each row is of the form [x y] as #in poly.txt. #iterate through each n in degrees, calling the feature_matrix and least_squares functions to solve #for the model parameters in each case. Append the result to paramFits each time. return paramFits #Return the feature matrix for fitting a polynomial of degree d based on the explanatory variable #samples in x. #Input: x as a list of the independent variable samples, and d as an integer. #Output: X, a list of features for each sample, where x[i][j] corresponds to the jth coefficient #for the ith sample. Viewed as a matrix, X should have dimension #samples by d+1. def feature_matrix(x, d): #fill in #There are several ways to write this function. The most efficient would be a nested list comprehension #which for each sample in x calculates x^d, x^(d-1), ..., x^0. return X #Return the least squares solution based on the feature matrix X and corresponding target variable samples in y. #Input: X as a list of features for each sample, and y as a list of target variable samples. #Output: B, a list of the fitted model parameters based on the least squares solution. def least_squares(x, y): X = np.array(X) y = np.array(y) #fill in #Use the matrix algebra functions in numpy to solve the least squares equations. This can be done in just one line. return B if name _main__': datapath = 'poly.txt' degrees = [2, 4] paramFits = main(datapath, degrees) print(paramFits)
Computers and Technology
1 answer:
3241004551 [841]2 years ago
8 0

Answer:

robuk plss55 5=5

Explanation:

just 5 pawpatrol

You might be interested in
The three main objectives of information security are.
kotykmax [81]

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

8 0
2 years ago
In Modern operating system, the __ feature has dramatically improved user productivity.
icang [17]

Multitasking, it allows you to do more than one thing at once.

3 0
3 years ago
In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
Burka [1]

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

5 0
3 years ago
A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless.
Olegator [25]

Answer:

RFID scanning or Barcode reader

Explanation

Smart refrigerators have inbuilt RFID scanning technology that help monitor the stock that is inside your fridge. Once you pass your items through the inbuilt RFID scanner in the fridge, the barcode of your items is cross-referenced with a database and given a unique tag for identification. This technology helps detect and track the stock that is inside your fridge and when you start running low, the RFID can be triggered to send a reminder as a notification on your email or a text message.

3 0
3 years ago
What file formats can you safely use in a video presentation
dlinn [17]

i use fat 86 try it ok

7 0
3 years ago
Other questions:
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • As part of his proofreading process, and to catch any spelling or grammar mistakes, John uses this feature in Word Online to hav
    7·1 answer
  • In computer logic what is order of instructions
    13·1 answer
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • Fill in the blank with the correct response.
    10·1 answer
  • Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
    15·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • What word can you type using only the left home row keys and the right reach keys?
    6·2 answers
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!