A Comparative Study on Supervised and Unsupervised Learning Approaches for Multilingual Text Categorization

Author(s):  
Chung-Hong Lee ◽  
Hsin-Chang Yang ◽  
Ting-Chung Chen ◽  
Sheng-Min Ma
2020 ◽  
Vol 2 (4) ◽  
pp. 513-528
Author(s):  
Rossella Aversa ◽  
Piero Coronica ◽  
Cristiano De Nobili ◽  
Stefano Cozzini

In this paper, we report upon our recent work aimed at improving and adapting machine learning algorithms to automatically classify nanoscience images acquired by the Scanning Electron Microscope (SEM). This is done by coupling supervised and unsupervised learning approaches. We first investigate supervised learning on a ten-category data set of images and compare the performance of the different models in terms of training accuracy. Then, we reduce the dimensionality of the features through autoencoders to perform unsupervised learning on a subset of images in a selected range of scales (from 1 μm to 2 μm). Finally, we compare different clustering methods to uncover intrinsic structures in the images.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 474
Author(s):  
Pradeep Kumar Mallick ◽  
Bibhu Prasad Mohanty ◽  
Sudan Jha ◽  
Kuhoo .

Countering digital dangers, particularly assault detection, is a testing region of research in the field of data affirmation. Intruders utilize polymorphic instruments to disguise the assault payload and dodge the detection methods. Many supervised and unsupervised learning comes closer from the field of machine learning and example acknowledgments have been utilized to expand the adequacy of intrusion detection systems (IDSs). Supervised learning approaches utilize just marked examples to prepare a classifier, however getting adequate named tests is lumbering, and requires the endeavors of area specialists. Notwithstanding, un-marked examples can without much of a stretch be acquired in some genuine issues. Contrasted with super-vised learning approaches, semi-supervised learning (SSL) addresses this issue by considering expansive number of unlabeled examples together with the marked examples to fabricate a superior classifier. In today’s age security is a big issue and every day when we are on the internet we are exposed to a huge number of threats where our personal information can be leaked. The information security and the Intrusion Detection System (IDS) play a critical role in the internet. IDS isan essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality, and system availability against possible threats. In this paper, we are proposing a modified Elitist approach where the value of fitness is multiplied by the times a variable which is determined on the basis of the value of Kappa (K).  


Sign in / Sign up

Export Citation Format

Share Document