The Machine of Teaching Quality Valuation Studies an Analytical Method

2013 ◽  
Vol 303-306 ◽  
pp. 1510-1513
Author(s):  
Yun Xia Wang

This text describes the research work in machine learning framework for the assessment of teaching quality , mainly focused on the analysis of data on information technology in the teaching process , and the use of artificial neural network method, the experiment , the experimental results reflect the level of teaching quality analysis . Experimental results show that the use of machine learning methods can indeed make a positive contribution to the teaching quality assessment .

Data is the most crucial component of a successful ML system. Once a machine learning model is developed, it gets obsolete over time due to presence of new input data being generated every second. In order to keep our predictions accurate we need to find a way to keep our models up to date. Our research work involves finding a mechanism which can retrain the model with new data automatically. This research also involves exploring the possibilities of automating machine learning processes. We started this project by training and testing our model using conventional machine learning methods. The outcome was then compared with the outcome of those experiments conducted using the AutoML methods like TPOT. This helped us in finding an efficient technique to retrain our models. These techniques can be used in areas where people do not deal with the actual working of a ML model but only require the outputs of ML processes


Author(s):  
Mojtaba Montazery ◽  
Nic Wilson

Support Vector Machines (SVM) are among the most well-known machine learning methods, with broad use in different scientific areas. However, one necessary pre-processing phase for SVM is normalization (scaling) of features, since SVM is not invariant to the scales of the features’ spaces, i.e., different ways of scaling may lead to different results. We define a more robust decision-making approach for binary classification, in which one sample strongly belongs to a class if it belongs to that class for all possible rescalings of features. We derive a way of characterising the approach for binary SVM that allows determining when an instance strongly belongs to a class and when the classification is invariant to rescaling. The characterisation leads to a computation method to determine whether one sample is strongly positive, strongly negative or neither. Our experimental results back up the intuition that being strongly positive suggests stronger confidence that an instance really is positive.


2021 ◽  
Vol 9 (2) ◽  
pp. 169
Author(s):  
Igor Ryazanov ◽  
Amanda T. Nylund ◽  
Debabrota Basu ◽  
Ida-Maja Hassellöv ◽  
Alexander Schliep

Driven by the unprecedented availability of data, machine learning has become a pervasive and transformative technology across industry and science. Its importance to marine science has been codified as one goal of the UN Ocean Decade. While increasing amounts of, for example, acoustic marine data are collected for research and monitoring purposes, and machine learning methods can achieve automatic processing and analysis of acoustic data, they require large training datasets annotated or labelled by experts. Consequently, addressing the relative scarcity of labelled data is, besides increasing data analysis and processing capacities, one of the main thrust areas. One approach to address label scarcity is the expert-in-the-loop approach which allows analysis of limited and unbalanced data efficiently. Its advantages are demonstrated with our novel deep learning-based expert-in-the-loop framework for automatic detection of turbulent wake signatures in echo sounder data. Using machine learning algorithms, such as the one presented in this study, greatly increases the capacity to analyse large amounts of acoustic data. It would be a first step in realising the full potential of the increasing amount of acoustic data in marine sciences.


2019 ◽  
Author(s):  
Blerta Rahmani ◽  
Hiqmet Kamberaj

AbstractIn this study, we employed a novel method for prediction of (macro)molecular properties using a swarm artificial neural network method as a machine learning approach. In this method, a (macro)molecular structure is represented by a so-called description vector, which then is the input in a so-called bootstrapping swarm artificial neural network (BSANN) for training the neural network. In this study, we aim to develop an efficient approach for performing the training of an artificial neural network using either experimental or quantum mechanics data. In particular, we aim to create different user-friendly online accessible databases of well-selected experimental (or quantum mechanics) results that can be used as proof of the concepts. Furthermore, with the optimized artificial neural network using the training data served as input for BSANN, we can predict properties and their statistical errors of new molecules using the plugins provided from that web-service. There are four databases accessible using the web-based service. That includes a database of 642 small organic molecules with known experimental hydration free energies, the database of 1475 experimental pKa values of ionizable groups in 192 proteins, the database of 2693 mutants in 14 proteins with given values of experimental values of changes in the Gibbs free energy, and a database of 7101 quantum mechanics heat of formation calculations.All the data are prepared and optimized in advance using the AMBER force field in CHARMM macromolecular computer simulation program. The BSANN is code for performing the optimization and prediction written in Python computer programming language. The descriptor vectors of the small molecules are based on the Coulomb matrix and sum over bonds properties, and for the macromolecular systems, they take into account the chemical-physical fingerprints of the region in the vicinity of each amino acid.Graphical TOC Entry


Author(s):  
Meiyan Xu ◽  
Junfeng Yao ◽  
Yifeng Zheng ◽  
Yaojin Lin

Existing machine learning methods for classification and recognition of EEG motor imagery usually suffer from reduced accuracy for limited training data. To address this problem, this paper proposes a multi-rhythm capsule network (FBCapsNet) that uses as little EEG information as possible with key features to classify motor imagery and further improves the classification efficiency. The network conforms to a small recognition model with only 3 acquisition channels but it can effectively use the limited data for feature learning. Based on the BCI Competition IV 2b data set, experimental results show that the proposed network can achieve 2.41% better performance than existing cutting-edge methods.


2011 ◽  
Vol 271-273 ◽  
pp. 1451-1454
Author(s):  
Gang Zhang ◽  
Jian Yin ◽  
Liang Lun Cheng ◽  
Chun Ru Wang

Teaching quality is a key metric in college teaching effect and ability evaluation. In many previous literatures, evaluation of such metric is merely depended on subjective judgment of few experts based on their experience, which leads to some false, bias or unstable results. Moreover, pure human based evaluation is expensive that is difficult to extend to large scale. With the application of information technology, much information in college teaching is recorded and stored electronically, which founds the basic of a computer-aid analysis. In this paper, we perform teaching quality evaluation within machine learning framework, focusing on learning and modeling electronic information associated with quality of teaching, to get a stable model described the substantial principles of teaching quality. Artificial Neural Network (ANN) is selected as the main model in this work. Experiment results on real data sets consisted of 4 subjects / 8 semesters show the effectiveness of the proposed method.


2021 ◽  
Vol 1 (1) ◽  
pp. 31
Author(s):  
Kristiawan Nugroho

The Covid-19 pandemic has occurred for a year on earth. Various attempts have been made to overcome this pandemic, especially in making various types of vaccines developed around the world. The level of vaccine effectiveness in dealing with Covid-19 is one of the questions that is often asked by the public. This research is an attempt to classify the names of vaccines that have been used in various nations by using one of the robust machine learning methods, namely the Neural Network. The results showed that the Neural Network method provides the best accuracy, which is 99.9% higher than the Random Forest and Support Vector Machine(SVM) methods.


2019 ◽  
Vol 8 (3) ◽  
pp. 4148-4153

The swiftly growth of spam email has escalated the need to upgrade the existing spam detection and filtration methods. There is the existence of several machine learning methods for the classification and detection of email spam but these lacks in some cases. In this research work ensemble methods are adapted to detect the email spam. The machine learning methods of Multinomial Naïve Bayes and J48 Decision Tree algorithms are considered and ensembled. The considered ensemble methods are bagging and boosting. The experimentation is conducted on the dataset of CSDMC2010 Spam corpus. The results for the considered dataset are evaluated using individual classifiers, bagging, and boosting ensemble approaches. The system performance is accessed in terms of precision, recall, f-measure, and accuracy. The experimental outcomes indicates the distinguish results for the detection of email spam using ensemble methods.


Author(s):  
Vahid Jalali ◽  
David Leake ◽  
Najmeh Forouzandehmehr

The ability of case-based reasoning systems to solve novel problems depends on their capability to adapt past solutions to new circumstances. However, acquiring the knowledge required for case adaptation is a classic challenge for CBR. This motivates the use of machine learning methods to generate adaptation knowledge. A popular approach uses the case difference heuristic (CDH) to generate adaptation rules from pairs of cases in the case base, based on the premise that the observed differences in case solutions result from the differences in the problems they solve, so can form the basic of rules to adapt cases with similar problem differences. Extensive research has successfully applied the CDH approach to adaptation rule learning for case-based regression (numerical prediction) tasks. However, classification tasks have been outside of its scope. The work presented in this paper addresses that gap by extending CDH-based learning of adaptation rules to apply to cases with categorical features and solutions. It presents the generalized case value heuristic to assess case and solution differences and applies it in an ensemble-based case-based classification method, ensembles of adaptations for classification (EAC), built on the authors' previous work on ensembles of adaptations for regression (EAR). Experimental results support the effectiveness of EAC.


2021 ◽  
Vol 11 (2) ◽  
pp. 2106-2112
Author(s):  
K. Mohana Sundaram ◽  
R. Sasikumar ◽  
Atthipalli Sai Meghana ◽  
Arava Anuja ◽  
Chandolu Praneetha

Phishing is a form of digital crime where spam messages and spam sites attract users to exploit sensitive information on fishermen. Sensitive information obtained is used to take notes or to access money. To combat the crime of identity theft, Microsoft's cloud-based program attempts to use logical testing to determine how you can build trust with the characters. The purpose of this paper is to create a molded channel using a variety of machine learning methods. Separation is a method of machine learning that can be used effectively to identify fish, assemble and test models, use different mixing settings, and look at different mechanical learning processes, and measure the accuracy of the modified model and show multiple measurement measurements. The current study compares predictive accuracy, f1 scores, guessing and remembering multiple machine learning methods including Naïve Bayes (NB) and Random forest (RF) to detect criminal messages to steal sensitive information and improve the process by selecting highlighting strategies and improving crime classification accuracy. to steal sensitive information.


Sign in / Sign up

Export Citation Format

Share Document