1. Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
2. With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools.
3. With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognitionoften for security purposes. Discuss whether such applications pose privacy threats.
Written on February 14th, 2021 by
Multiple anomaly detection
Posted in APA (edition "APA 6"), Computer science