SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Path to „Idagrotte“, Sächsische Schweiz
Tutorial: Spyout
• Rainer Bruggemann
• Peter Koppatz
Imagine, you have a wonderful
data matrix. The data matrix has
no gaps, objects are a, b, c,…,
two indicators q1, q2.
The file is called chaindivlength3.txt.
These two buttons make your data file
available for PyHasse.
I like more the „sets“-Button at the top,
but the other can be used as well.
Press „Sets“ and a window pops up, asking you where the file chaindivlength3.txt can
be found.
We check first „list of sets“. Perhaps this file is already in the internal data base?
Indeed it is already in the internal data base!
If not, select „Load CSV (or txt) data from file.
In this case you have to
1) Browse through your system of folders to identify the
location of the file ; German: „Durchsuchen“
2) „submit“
The next step: You may check, whether you have uploaded the correct file.
In „General Info“ you‘ll find many interesting items; however for the moment:
Just select „data“, then you‘ll see:
Ah, not all data are shown here, because of the limited area within this presentation.
However, we think: You are happy. These data are those you have gathered.
„General Info“ is module independent:
•Show: Hasse diagram
•Matrix data: matrix specifications
•Calculations: Order theoretical information
Other items in „Calculations“ (2)
Order theoetical information
– Zeta matrix: adjacency matrix of the directed graph resulting
from object‘s comparison based on their data
– Cover matrix: The transitive reduction of the zeta matrix
– Levels: A weak order of the objects
– Equivalence classes: Due to the fact that objects may be
equivalent to each other with respect to the actually considered
indicators
We suppose that you will be mostly interested in the Hasse diagram…
Press Calculations, select „Hasse diagram“:
You didn‘t get the same graph??? Your result looks like that one?
With the mouse drag and draw function the graph can be edited by just move the
vertices in horizontal directions (taking into regard the invariance of order relations)!
Many other tools are available. However, here we concentrate us on the next steps.
Sorry! You don‘t like the color of the Hasse diagram?? Here we are (Select: Home, Setting):
Background color for nodes as well as the two backgroundcolors were changed:
If this setting is not your favourate one, select yourself the parameters of drawing.
Try by yourself
what can be done
….
Here „posetic coordinates“ are shown: For example object b has 2 elements in its
principal down set, 4 elements in its principal up set and b is incomparable with 6 other
objects.
When you are interested in ranking then chains are of special interest:
Any chain allows you a unique ranking of a subset of objects, without any additional
assumption such as weight parameters. After selecting objects a and d and pressing „Calc“
The following list of chains, ordered for decreasing lengths is obtained.
Chain 0 is the longest one, it includes 6 objects out of 11,
then 4 chains (chain 1 - chain 4) appear with only 4 objects,
finally there are two short chains with only 3 objects.
• Chains are important, because they allow an unambiguous ranking
of some objects, although there are more than one attributes.
• Are all these chains similar? For example chain 5 and 6 differ only
by one element. What can be said about the four chains with four
objects? A similarity study of chains is the task of another module,
namely chain.
• Six objects out of 11: Perhaps not that good result. You want an
order, where all 11 objects are included, without taking care for
weights? Then look to the module lpom of PyHasse. Perhaps this
module makes you happy.
• You want to apply another procedure to get a linear order of your
objects? Ok, in our point of view the Copeland index could do a
good job. See module copeland
• Let us finally try another object pair:
Some remarks are now in order…
Let us try for instance „b“ and „i“. Here is the reponse of the PyHasse program!
When you look at the Hasse diagram, you see the reason:
These two objects are incomparable. Therefore either you select another pair,
or you detect, why these two objects are incomparable:
Pressing „Calc“ gives:
Ok, ok! This result is not too interesting, as we have only two attributes.
The response of spyout tells you q1 for the first object (object b) has value 10,
for the second object (object i) 4, but for attribute q2 the relation is turned around:
Object b has value 10, but object i has by far a larger value in q2, namely 53.
Finally the last column shows what is the general range of the attribute
Values supporting you with some ideas whether the data differences are
important or not.
• Usually many attribute pairs can be considered, where each
single pair can but contribute to the incomparability found.
• Furthermore the data differences can be very different.
Both aspects must be shown to the user. He may draw his
own conclusions.
• Often one wants to see incomparability in the context of
the whole data matrix. If yes, then PyHasse offers another
module namely acm for a deepened analysis.
• The user may think that sometimes data differences are not
really important. An analysis based on fuzzy concepts may
then be helpful. PyHasse has a module, called fuzzy, which
can be helpful.
Once again, some remarks are in order:
• See www.pyhasse.org and references and links
therein
• Demo: http://spyout.pyhasse.org
• You want to contact us: The email address:
spyout@pyhasse.org
• You want to call us?
– R.Bruggemann (+49) 30 6496676
– P.Koppatz (+49) 331 20029708

Weitere ähnliche Inhalte

Was ist angesagt?

Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real lifeStudent
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matricesmailrenuka
 
Open addressing &amp rehashing,extendable hashing
Open addressing &amp rehashing,extendable hashingOpen addressing &amp rehashing,extendable hashing
Open addressing &amp rehashing,extendable hashingHaripritha
 
Application of matrices in Daily life
Application of matrices in Daily lifeApplication of matrices in Daily life
Application of matrices in Daily lifeshubham mishra
 
358 33 powerpoint-slides_15-hashing-collision_chapter-15
358 33 powerpoint-slides_15-hashing-collision_chapter-15358 33 powerpoint-slides_15-hashing-collision_chapter-15
358 33 powerpoint-slides_15-hashing-collision_chapter-15sumitbardhan
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec ISajid Marwat
 
lecture 9
lecture 9lecture 9
lecture 9sajinsc
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec IISajid Marwat
 
Data structure lecture 2 (pdf)
Data structure lecture 2 (pdf)Data structure lecture 2 (pdf)
Data structure lecture 2 (pdf)Abbott
 
Insertion in singly linked list
Insertion in singly linked listInsertion in singly linked list
Insertion in singly linked listKeval Bhogayata
 

Was ist angesagt? (20)

Link list
Link listLink list
Link list
 
Linear search-and-binary-search
Linear search-and-binary-searchLinear search-and-binary-search
Linear search-and-binary-search
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real life
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matrices
 
Hashing
HashingHashing
Hashing
 
Open addressing &amp rehashing,extendable hashing
Open addressing &amp rehashing,extendable hashingOpen addressing &amp rehashing,extendable hashing
Open addressing &amp rehashing,extendable hashing
 
Application of matrices in Daily life
Application of matrices in Daily lifeApplication of matrices in Daily life
Application of matrices in Daily life
 
358 33 powerpoint-slides_15-hashing-collision_chapter-15
358 33 powerpoint-slides_15-hashing-collision_chapter-15358 33 powerpoint-slides_15-hashing-collision_chapter-15
358 33 powerpoint-slides_15-hashing-collision_chapter-15
 
Application of matrices in real life
Application of matrices in real lifeApplication of matrices in real life
Application of matrices in real life
 
Advance algorithm hashing lec I
Advance algorithm hashing lec IAdvance algorithm hashing lec I
Advance algorithm hashing lec I
 
lists
listslists
lists
 
Chapter 12 ds
Chapter 12 dsChapter 12 ds
Chapter 12 ds
 
lecture 9
lecture 9lecture 9
lecture 9
 
Fem in matlab
Fem in matlabFem in matlab
Fem in matlab
 
Advance algorithm hashing lec II
Advance algorithm hashing lec IIAdvance algorithm hashing lec II
Advance algorithm hashing lec II
 
Data structures notes
Data structures notesData structures notes
Data structures notes
 
linear probing
linear probinglinear probing
linear probing
 
Data structure lecture 2 (pdf)
Data structure lecture 2 (pdf)Data structure lecture 2 (pdf)
Data structure lecture 2 (pdf)
 
Insertion in singly linked list
Insertion in singly linked listInsertion in singly linked list
Insertion in singly linked list
 
Es6 day3
Es6 day3Es6 day3
Es6 day3
 

Ähnlich wie Tutorial spyout

Arrays and linked lists
Arrays and linked listsArrays and linked lists
Arrays and linked listsAfriyieCharles
 
Chapter 4 algorithmic efficiency handouts (with notes)
Chapter 4   algorithmic efficiency handouts (with notes)Chapter 4   algorithmic efficiency handouts (with notes)
Chapter 4 algorithmic efficiency handouts (with notes)mailund
 
Simulating data to gain insights into power and p-hacking
Simulating data to gain insights intopower and p-hackingSimulating data to gain insights intopower and p-hacking
Simulating data to gain insights into power and p-hackingDorothy Bishop
 
17- Kernels and Clustering.pptx
17- Kernels and Clustering.pptx17- Kernels and Clustering.pptx
17- Kernels and Clustering.pptxssuser2023c6
 
End-to-End Machine Learning Project
End-to-End Machine Learning ProjectEnd-to-End Machine Learning Project
End-to-End Machine Learning ProjectEng Teong Cheah
 
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...Active Image Clustering: Seeking Constraints from Humans to Complement Algori...
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...Harish Vaidyanathan
 
Advanced s and s algorithm.ppt
Advanced s and s algorithm.pptAdvanced s and s algorithm.ppt
Advanced s and s algorithm.pptLegesseSamuel
 
Building graphs to discover information by David Martínez at Big Data Spain 2015
Building graphs to discover information by David Martínez at Big Data Spain 2015Building graphs to discover information by David Martínez at Big Data Spain 2015
Building graphs to discover information by David Martínez at Big Data Spain 2015Big Data Spain
 
L8 scientific visualization of data
L8 scientific visualization of dataL8 scientific visualization of data
L8 scientific visualization of dataSeppo Karrila
 

Ähnlich wie Tutorial spyout (20)

Cwkaa 2010
Cwkaa 2010Cwkaa 2010
Cwkaa 2010
 
Arrays and linked lists
Arrays and linked listsArrays and linked lists
Arrays and linked lists
 
Algorithms
Algorithms Algorithms
Algorithms
 
Chapter 4 algorithmic efficiency handouts (with notes)
Chapter 4   algorithmic efficiency handouts (with notes)Chapter 4   algorithmic efficiency handouts (with notes)
Chapter 4 algorithmic efficiency handouts (with notes)
 
Spss basics
Spss basicsSpss basics
Spss basics
 
Visualization-2
Visualization-2Visualization-2
Visualization-2
 
Unsupervised Learning
Unsupervised LearningUnsupervised Learning
Unsupervised Learning
 
Simulating data to gain insights into power and p-hacking
Simulating data to gain insights intopower and p-hackingSimulating data to gain insights intopower and p-hacking
Simulating data to gain insights into power and p-hacking
 
17- Kernels and Clustering.pptx
17- Kernels and Clustering.pptx17- Kernels and Clustering.pptx
17- Kernels and Clustering.pptx
 
End-to-End Machine Learning Project
End-to-End Machine Learning ProjectEnd-to-End Machine Learning Project
End-to-End Machine Learning Project
 
tutorial.ppt
tutorial.ppttutorial.ppt
tutorial.ppt
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
lec1.ppt
lec1.pptlec1.ppt
lec1.ppt
 
OCT-20
OCT-20OCT-20
OCT-20
 
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...Active Image Clustering: Seeking Constraints from Humans to Complement Algori...
Active Image Clustering: Seeking Constraints from Humans to Complement Algori...
 
Advanced s and s algorithm.ppt
Advanced s and s algorithm.pptAdvanced s and s algorithm.ppt
Advanced s and s algorithm.ppt
 
day 13.pptx
day 13.pptxday 13.pptx
day 13.pptx
 
Building graphs to discover information by David Martínez at Big Data Spain 2015
Building graphs to discover information by David Martínez at Big Data Spain 2015Building graphs to discover information by David Martínez at Big Data Spain 2015
Building graphs to discover information by David Martínez at Big Data Spain 2015
 
The awesome algorithm
The awesome algorithmThe awesome algorithm
The awesome algorithm
 
L8 scientific visualization of data
L8 scientific visualization of dataL8 scientific visualization of data
L8 scientific visualization of data
 

Mehr von pyhasse

Folien: Linuxtage Chemnitz 2018
Folien: Linuxtage Chemnitz 2018Folien: Linuxtage Chemnitz 2018
Folien: Linuxtage Chemnitz 2018pyhasse
 
PyMove3D CodeWeek 2017
PyMove3D CodeWeek 2017PyMove3D CodeWeek 2017
PyMove3D CodeWeek 2017pyhasse
 
Exkursion Pflanzenbestimmung
Exkursion PflanzenbestimmungExkursion Pflanzenbestimmung
Exkursion Pflanzenbestimmungpyhasse
 
Blender at school
Blender at schoolBlender at school
Blender at schoolpyhasse
 
Blender 3D für die Schule
Blender 3D für die SchuleBlender 3D für die Schule
Blender 3D für die Schulepyhasse
 
Hasse diagram in 3D
Hasse diagram in 3DHasse diagram in 3D
Hasse diagram in 3Dpyhasse
 
Hasse Diagramme in 3D
Hasse Diagramme in 3DHasse Diagramme in 3D
Hasse Diagramme in 3Dpyhasse
 
Digitalisierung von Büchern
Digitalisierung von BüchernDigitalisierung von Büchern
Digitalisierung von Büchernpyhasse
 

Mehr von pyhasse (8)

Folien: Linuxtage Chemnitz 2018
Folien: Linuxtage Chemnitz 2018Folien: Linuxtage Chemnitz 2018
Folien: Linuxtage Chemnitz 2018
 
PyMove3D CodeWeek 2017
PyMove3D CodeWeek 2017PyMove3D CodeWeek 2017
PyMove3D CodeWeek 2017
 
Exkursion Pflanzenbestimmung
Exkursion PflanzenbestimmungExkursion Pflanzenbestimmung
Exkursion Pflanzenbestimmung
 
Blender at school
Blender at schoolBlender at school
Blender at school
 
Blender 3D für die Schule
Blender 3D für die SchuleBlender 3D für die Schule
Blender 3D für die Schule
 
Hasse diagram in 3D
Hasse diagram in 3DHasse diagram in 3D
Hasse diagram in 3D
 
Hasse Diagramme in 3D
Hasse Diagramme in 3DHasse Diagramme in 3D
Hasse Diagramme in 3D
 
Digitalisierung von Büchern
Digitalisierung von BüchernDigitalisierung von Büchern
Digitalisierung von Büchern
 

Kürzlich hochgeladen

Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 

Kürzlich hochgeladen (20)

Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 

Tutorial spyout

  • 1. Path to „Idagrotte“, Sächsische Schweiz Tutorial: Spyout • Rainer Bruggemann • Peter Koppatz
  • 2. Imagine, you have a wonderful data matrix. The data matrix has no gaps, objects are a, b, c,…, two indicators q1, q2. The file is called chaindivlength3.txt. These two buttons make your data file available for PyHasse. I like more the „sets“-Button at the top, but the other can be used as well.
  • 3. Press „Sets“ and a window pops up, asking you where the file chaindivlength3.txt can be found. We check first „list of sets“. Perhaps this file is already in the internal data base?
  • 4. Indeed it is already in the internal data base! If not, select „Load CSV (or txt) data from file. In this case you have to 1) Browse through your system of folders to identify the location of the file ; German: „Durchsuchen“ 2) „submit“
  • 5. The next step: You may check, whether you have uploaded the correct file. In „General Info“ you‘ll find many interesting items; however for the moment: Just select „data“, then you‘ll see: Ah, not all data are shown here, because of the limited area within this presentation. However, we think: You are happy. These data are those you have gathered.
  • 6. „General Info“ is module independent: •Show: Hasse diagram •Matrix data: matrix specifications •Calculations: Order theoretical information
  • 7. Other items in „Calculations“ (2) Order theoetical information – Zeta matrix: adjacency matrix of the directed graph resulting from object‘s comparison based on their data – Cover matrix: The transitive reduction of the zeta matrix – Levels: A weak order of the objects – Equivalence classes: Due to the fact that objects may be equivalent to each other with respect to the actually considered indicators
  • 8. We suppose that you will be mostly interested in the Hasse diagram… Press Calculations, select „Hasse diagram“:
  • 9. You didn‘t get the same graph??? Your result looks like that one? With the mouse drag and draw function the graph can be edited by just move the vertices in horizontal directions (taking into regard the invariance of order relations)! Many other tools are available. However, here we concentrate us on the next steps.
  • 10. Sorry! You don‘t like the color of the Hasse diagram?? Here we are (Select: Home, Setting):
  • 11. Background color for nodes as well as the two backgroundcolors were changed: If this setting is not your favourate one, select yourself the parameters of drawing.
  • 12. Try by yourself what can be done ….
  • 13. Here „posetic coordinates“ are shown: For example object b has 2 elements in its principal down set, 4 elements in its principal up set and b is incomparable with 6 other objects.
  • 14. When you are interested in ranking then chains are of special interest: Any chain allows you a unique ranking of a subset of objects, without any additional assumption such as weight parameters. After selecting objects a and d and pressing „Calc“ The following list of chains, ordered for decreasing lengths is obtained.
  • 15. Chain 0 is the longest one, it includes 6 objects out of 11, then 4 chains (chain 1 - chain 4) appear with only 4 objects, finally there are two short chains with only 3 objects.
  • 16. • Chains are important, because they allow an unambiguous ranking of some objects, although there are more than one attributes. • Are all these chains similar? For example chain 5 and 6 differ only by one element. What can be said about the four chains with four objects? A similarity study of chains is the task of another module, namely chain. • Six objects out of 11: Perhaps not that good result. You want an order, where all 11 objects are included, without taking care for weights? Then look to the module lpom of PyHasse. Perhaps this module makes you happy. • You want to apply another procedure to get a linear order of your objects? Ok, in our point of view the Copeland index could do a good job. See module copeland • Let us finally try another object pair: Some remarks are now in order…
  • 17. Let us try for instance „b“ and „i“. Here is the reponse of the PyHasse program! When you look at the Hasse diagram, you see the reason: These two objects are incomparable. Therefore either you select another pair, or you detect, why these two objects are incomparable:
  • 18. Pressing „Calc“ gives: Ok, ok! This result is not too interesting, as we have only two attributes. The response of spyout tells you q1 for the first object (object b) has value 10, for the second object (object i) 4, but for attribute q2 the relation is turned around: Object b has value 10, but object i has by far a larger value in q2, namely 53. Finally the last column shows what is the general range of the attribute Values supporting you with some ideas whether the data differences are important or not.
  • 19. • Usually many attribute pairs can be considered, where each single pair can but contribute to the incomparability found. • Furthermore the data differences can be very different. Both aspects must be shown to the user. He may draw his own conclusions. • Often one wants to see incomparability in the context of the whole data matrix. If yes, then PyHasse offers another module namely acm for a deepened analysis. • The user may think that sometimes data differences are not really important. An analysis based on fuzzy concepts may then be helpful. PyHasse has a module, called fuzzy, which can be helpful. Once again, some remarks are in order:
  • 20. • See www.pyhasse.org and references and links therein • Demo: http://spyout.pyhasse.org • You want to contact us: The email address: spyout@pyhasse.org • You want to call us? – R.Bruggemann (+49) 30 6496676 – P.Koppatz (+49) 331 20029708