1. Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
2. With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools.
3. With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognitionoften for security purposes. Discuss whether such applications pose privacy threats.