1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
9

You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on y

our validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?
Computers and Technology
1 answer:
inn [45]3 years ago
8 0

Answer:

The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data

Explanation:

Solution

The various reasons that could be causing the problem is given as follows :

1. A wide number of parameters :

  • In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers.
  • When the training is performed in this tree, then the model files the data too well.
  • When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.

2. Noisy Data:

  • The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values.
  • When the tree is trained on this noisy data, then it sets its parameters according to the training data.
  • As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.

You might be interested in
Which one is not the part of motherboard ?<br>O Registers<br>O<br>Bus<br>O<br>Port<br>O<br>none​
Svetradugi [14.3K]

Answer:

can you expand on your question?

5 0
2 years ago
Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
butalik [34]

Answer:

backup; recovery

Explanation:

Backup and recovery refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up.

Data backup is a form of disaster recovery and should be part of any disaster recovery plan.In some cases, backing up or restoring entire systems, or the enterprise, after an event or disaster can take days

5 0
3 years ago
Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
disa [49]

Answer:

Sandboxing.

Explanation:

SDLC or software development life cycle is a systematic approach to software development. It marks the birth and death of an application.

The application development starts from the research of the properties of the application to the design and development or implementation of the application.

After the implementation of the software, it is tested, comparing the design and the codes in the development process. The sandboxing testing process helps to isolate and test new lines of code added during the testing phase.

3 0
3 years ago
What is the next line?
lianna [129]

Answer:

4

Explanation:got it right on edg.

4 0
2 years ago
When you see a blank pointer this means you can drag the row or column border to change height or width
Orlov [11]
No, you would see arrows pointing in opposite directions <--> like so
7 0
3 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • All languages from the second generation on must be translated into machine language for the computer to be able process the inp
    8·1 answer
  • Finding your style in photography is about ___
    10·2 answers
  • True or False: clicking ads and pop-ups like the one below could expose your computer to malware.
    11·2 answers
  • ----------HELP WITH 3 QUESTIONS FOR 30 POINTS!!!---------
    6·1 answer
  • Which cloud computing service model will enable an application developer to develop, manage, and test their applications without
    15·1 answer
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Give an example where traditional laws and modern media have created "grey areas".
    6·1 answer
  • Only cool people answer this question.<br><br><br><br><br> are you cool?
    11·2 answers
  • Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!