- Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
- With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools.
- With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognitionoften for security purposes. Discuss whether such applications pose privacy threats.