CS5087701 Machine Learning- Assignment Problem

Assignment Help Computer Engineering
Reference no: EM132392844

CS5087701 Machine Learning

Question. Analyze the Adult dataset from UCI and the Spooky Author Identification from Kaggle.

Question 2.1. Derive the gradient descent learning rule for a single perceptron where the prediction function is given by

h(x)= h(x1,x2,x3,..... , xn) = w0 + w1x1 + w1x12 + ..... + wn xn + wnxn2.

Question 2.2. Consider the alternative error function given by for a single layer network. Derive the gradient descent learning rule for this error function. Show that it can be implemented by multiplying each weight by some constant before performing the standard gradient learning rule.

E(w) = 1/2 (ΣiΣk (yk(i)-hk(x(i)))2) +γ Σjwj2.

Question 2.3. Continue analyzing the Adult and Spooky Author Identification (SAI) datasets, but using Artificial Neural Networks this time. Similarly, you should give all necessary details of your study in a mini report of around two to four pages with a discussion section.

In your report, you should include the following items:

(a) All the experimental settings in the experiments.

(b) The prediction accuracy with cross-validation and possible different data partitions.

(c) Can we use ANN for both datasets with acceptable performance?

(d) If we multiply some of the input attributes with a big number, say, for the Adult dataset, will we obtain similar result afterwards?

(e) Give the reasons why the result is good (or bad) for different numbers of iterations in the ANN training. Do you observe any overfitting?

(f) Will we obtain different result if we try different numbers of attributes as the input.

(g) Provide at least one case study that is about how to choose a good ANN structure, such as choosing the number of hidden layers, the number of hidden nodes in the hidden layer(s) to name a few. Do you observe any overfitting?

(h) Given the SAI dataset, can you suggest an alternative way to feed the inputs to the network so that we may have a better result?

(i) Do you have a thought on the information stored on the hidden nodes? Can you give any explanation on the hidden node values given an input? Answer the question regarding to one of the Adult and SAI datasets or both.

Reference no: EM132392844

Questions Cloud

What is the probability that you randomly select a black : A stable has all American Quarter Horses. There are 15 bays, 12 blacks, and 7 red duns. (Use these data for this question only.)
Phosphate values are normally distributed : Was there a significant decrease in phosphate levels after the laws were enacted? Assume the phosphate values are normally distributed.
TQM 603 Statistical Quality Control Assignment Problem : TQM 603 Statistical Quality Control Assignment Help and Solution, City University College of Ajman, UAE - How do you construct the different KPIVs
What is the probability that the omelet : A. There are 3 rotten eggs in a carton of 10 eggs. If 3 eggs are randomly selected from the carton in order to make an omelet
CS5087701 Machine Learning- Assignment Problem : CS5087701 Machine Learning Assignment Help and Solutions- National Taiwan University of Science and Technology, China-Can we use ANN for both datasets.
Corresponding assumptions in performing the test : In order to test whether the average assembly time for a new product is the same among three production lines, the production manager of a corporation
Determining the crime concerns in china : Calculate a z-score using the observed percentage and the two model parameters. Round to four decimal places.
What is the probability of a randomly selected student : What is the probability of a randomly selected student failing (a fail grade is anything below 50).
Problem regarding the confidence intervals : A survey of customers at a local supermarket asks whether they found shopping at this market more pleasing than at a nearby store. Of the 2,500 forms

Reviews

Write a Review

Computer Engineering Questions & Answers

  Calculate the approximate bit rate and signal level

Calculate the approximate bit rate and signal level(s) for a 4.2 MHz bandwidth system with a signal to noise ratio of 170. In a peer-to-peer (P2P) network, Internet users that are ready to share their resources become peers and form a network. Descr..

  How the architecture is to be used in the system

Discuss in detail, using diagrams to support your words, how the architecture is to be used in the system. Address operational, performance, security, cultural, and political requirements for the project.

  Why you should always search the free space

Explain why you should always search the free space and slack space if you suspect person who deliberately delete file or information on a workstation.

  How do you get your menus and toolbar back

Have the menus and toolbar not show when MS ACCESS is running However, once you do this you will find that you can't edit your Navigation Form.

  Define various types of reading materialb using classes

Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journals, textbooks, and so on.

  Examine why do we need an automated tool for sql injection

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql.

  What type of new countermeasures should implemented

Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific.

  Write your mini-security policy in detail

In reading the excerpt from the textbook on what happened and how Snowden was able to access the data that he did, write a mini-security policy following.

  Write a program to handle student data in an input file

Write a program to handle student data in an input file. Each line in the file represents information for one student.

  Which array types can hold object references

What is the default initialization value for a integer array.

  Display the frequency table of the characters in the file

Write a program that prompts the user to enter a file name, displays the frequency table of the characters in the file.

  Why did you include or exclude data from the research

The assignment is designed to assist with documenting your research. Since, you are entering the data collection and analysis phase of the research.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd