1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
5

What is generalization error in terms of the SVM? a. How accurately the SVM can predict outcomes for unseen data b. How far the

hyperplane is from the support vectors c. The threshold amount of error in an SVM
Computers and Technology
1 answer:
andreev551 [17]3 years ago
4 0

Answer:

a. How accurately the SVM can predict outcomes for unseen data

Explanation:

Generalization Error in terms of the SVM which is an acronym for Support Vector Machine, that deals with a form of administered learning standard, is a criterion of how accurately the Support Vector Machine algorithm can make a forecast of concluding information for formerly hidden data.

Hence, in this case, the correct answer is option A, which is Generalization error in terms of the SVM is "How accurately the SVM can predict outcomes for unseen data"

You might be interested in
It is important to avoid using a person’s title in an email to avoid offending him or her.
Nataly [62]

The answer to this is FALSE. I just took the test & got 100%.

3 0
3 years ago
Read 2 more answers
C++ coding, help
Zanzabum

Answer:

The program in C++ is as follows:

#include <fstream>

#include <iostream>

#include <iomanip>

using namespace std;

int main() {

 string filename;

 cout<<"Filename: ";

 cin>>filename;

 ifstream inFile(filename);

 if(!inFile) {

   cout << endl << "Cannot open file " << filename;

   return 1;  }  

 ofstream fout;

 ifstream fin;

 fin.open("invalid-numbers.txt");  

 fout.open ("invalid-numbers.txt",ios::app);  

 double sum = 0; int valid = 0; int invalid = 0;

 double num = 0;

 while(!inFile.eof()) {

   inFile >> num;

   if(num >= 0 && num<=110){   sum+=num; valid++; }

else{ invalid++;

if(fin.is_open()){

   fout<<fixed<<setprecision(2)<<num<<"\n";    }  }  }

 fin.close();

 fout.close();

 inFile.close();

 cout<<"Total values: "<<valid+invalid<<endl;

 cout<<"Invalid values: "<<invalid<<endl;

 cout<<"Valid values: "<<valid<<endl;

 cout<<"Average of valid values: "<<fixed<<setprecision(2)<<sum/valid<<endl;    

 double inv;

 ifstream inFiles("invalid-numbers.txt");

 while(!inFiles.eof()) {

   inFiles >> inv;

   cout<<inv<<"\n";

}

inFiles.close();

 return 0;

}

Explanation:

See attachment for source file where comments are used to explain each line

Download cpp
4 0
3 years ago
A device that does not work well in a system can sometimes be improved by updating its ___computer ____________.
Semenov [28]
I believe its "By updating its computer driver i know its not software im pretty sure its a driver because all the components in a comuter have a specific driver and they need to be mainitanced yearly. P.s Glad to help you.
5 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
At the very lowest level what data does a computer understand?
kumpel [21]
In fact, at the lowest level, computers only understand sequences of numbers that represent operational codes (op codes for short). On the other hand, it would be very difficult for humans to write programs in terms of op codes
8 0
3 years ago
Other questions:
  • You discover many errors in a database table. What has been lost?
    15·2 answers
  • he function below takes one parameter: a list of strings (string_list). Complete the function to return a new list containing on
    5·2 answers
  • If the pc-doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    9·1 answer
  • Which color reflects more light red blue black or white
    6·1 answer
  • What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
    13·1 answer
  • A device which lets you interact with the computer
    6·2 answers
  • Is 583 a string or a number?
    13·2 answers
  • We will cover email use and management. Training topics include:
    5·1 answer
  • Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc
    12·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!