This is a tidy chapter on principle component analysis (PCA). There are many fine tutorials on PCA to be found… Read more
Category: Using R
Machine Learning for Hackers, Chapter 7
The title of this chapter, “Optimization: Breaking Codes”, sounds more exciting than it really is. The code breaking is attempted… Read more
Machine Learning for Hackers, Chapter 6
Chapter 6 covers orthogonal polynomial regression, cross-validation, regularization and a touch of logistic regression. The case study is predicting popularity… Read more
Machine Learning for Hackers, Chapter 5
This chapter covers linear regression. The case study is predicting page views for web sites given unique visitors, whether the… Read more
Machine Learning for Hackers, Chapter 4
This chapter explains how to create a ranking algorithm to prioritize email messages in your inbox. The authors mention Google… Read more
Simulating the Monty Hall Problem
Back in 1990, the following question was posed to PARADE magazine columnist, Marilyn Vos Savant (once holder of the Guinness World Record for highest… Read more
Machine Learning for Hackers, Chapter 3
In this chapter you build a naïve Bayes classifier to classify an email as spam or not spam (or “ham”… Read more
Machine Learning for Hackers, Chapter 2
Chapter 2 of Machine Learning for Hackers is called Data Exploration. It explains means, medians, quartiles, variance, histograms, scatterplots, things… Read more
Machine Learning for Hackers, Chapter 1
I’ve started working through the book, Machine Learning for Hackers, and decided I would document what I learned or found… Read more
Handy R Function: expand.grid
In graduate school I took an experimental design class. As expected, we were assigned a group project that required us… Read more