Details



AN IN-DEPTH ANALYSIS OF THE MARGINALISED AUTO-ENCODER DENOISING TO ENHANCE ITS EFFICIENCY

Devansh Balhara

45-50

Vol. 9, Jan-Jun, 2019

Date of Submission: 2019-02-12 Date of Acceptance: 2019-03-18 Date of Publication: 2019-03-24

Abstract

As an indication of constantly standard web putting together, cyberbullying has turned into an annoying issue torturing young people, youngsters and lively grown-ups. AI procedures make the modified revelation of torturing messages in online frameworks organization possible, producing a solid and safe electronic long reach relational correspondence condition. In this tremendous examination zone, one key issue is serious and discriminative mathematical portrayal learning of texts. We recommend differently descriptive training method in this paper. SMSDA is transferred to plan for semantic improvement for our approach's separable basic learning model accumulated denoising autoencoder. The semantic advancement incorporates semantic dropout commotion and sparsity destinations, where the semantic dropout ruckus is arranged thinking about a space of learning and the word embeddings framework. Our proposed technique can prevent the covered component plan from upsetting information and include a faltering and discriminative item description. You rolex replicarolex replica watches with Swiss movements! Place an order online quickly!
You can buy 2023 best omega super clone watches UK from the shop online.

References

  1. A. M. Kaplan and M. Haenlein, 'Users of the world, unite! The challenges and opportunities of social media,' Business horizons, vol. 53, no. 1, pp. 59–68, 2010.
  2. R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, 'Bullying in the digital age: A critical review and meta analysis of cyberbullying research among youth.' 2014.
  3. M. Ybarra, 'Trends in technology-based sexual and non-sexual aggression over time and linkages to nontechnology aggression, 'National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
  4. B. K. Biggs, J. M. Nelson, and M. L. Sampilo, 'Peer relations in the anxiety–depression link: Test of a mediation model,' Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.
  5. S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook of bullying in schools: An international perspective. Routledge/Taylor & Francis Group, 2010.
  6. G. Gini and T. Pozzoli, 'Association between bullying and psychosomatic problems: A meta-analysis,' Pediatrics, vol. 123, no. 3, pp. 1059–1065, 2009.
  7. A. Kontostathis, L. Edwards, and A. Leatherman, 'Text mining and cybercrime,' Text Mining: Applications and Theory. John Wiley & Sons, Ltd, Chichester, UK, 2010.
  8. J.M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, 'Learning from bullying traces in social media,' in Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, 2012, pp. 656–666.
  9. Q. Huang, V. K. Singh, and P. K. Atrey, 'Cyber bullying detection using social and textual analysis,' in Proceedings of the 3rd International Workshop on Socially-Aware Multimedia. ACM, 2014, pp.3–6.
  10. D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, 'Detection of harassment on web 2.0,' Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1–7, 2009.
  11. K. Dinakar, R. Reichart, and H. Lieberman, 'Modeling the detection of textual cyberbullying.' in The Social Mobile Web, 2011.
  12. V. Nahar, X. Li, and C. Pang, 'An effective approach for cyberbullying detection,' Communications in Information Science and Management Engineering, 2012.
  13. M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, 'Improved cyberbullying detection using gender information,' in Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop (DIR2012). Ghent, Belgium: ACM, 2012.
  14. M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong, 'Improving cyberbullying detection with user context,' in Advances in Information Retrieval. Springer, 2013, pp. 693–696.
  15. P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, 'Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,' The Journal of Machine Learning Research, vol. 11, pp. 3371–3408, 2010.
  16. P. Baldi, 'Autoencoders, unsupervised learning, and deep architectures,' Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
  17. M. Chen, Z. Xu, K. Weinberger, and F. Sha, 'Marginalized denoising autoencoders for domain adaptation,' arXiv preprint arXiv: 1206.4683, 2012.
  18. T. K. Landauer, P. W. Foltz, and D. Laham, 'An introduction to latent semantic analysis,' Discourse processes, vol. 25, no. 2-3, pp.259–284, 1998.
  19. T. L. Griffiths and M. Steyvers, 'Finding scientific topics,' Proceedings of the National academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228–5235, 2004.
  20. D. M. Blei, A. Y. Ng, and M. I. Jordan, 'Latent dirichlet allocation,' the Journal of machine Learning research, vol. 3, pp. 993–1022, 2003.
  21. T. Hofmann, 'Unsupervised learning by probabilistic latent semantic analysis,' Machine learning, vol. 42, no. 1-2, pp. 177–196, 2001.
  22. Y. Bengio, A. Courville, and P. Vincent, 'Representation learning: A review and new perspectives,' Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp. 1798–1828, 2013.
  23. B. L. McLaughlin, A. A. Braga, C. V. Petrie, M. H. Moore et al., Deadly Lessons:: Understanding Lethal School Violence. National Academies Press, 2002.
  24. J. Juvonen and E. F. Gross, 'Extending the school grounds? bullying experiences in cyberspace,' Journal of School health, vol. 78, no. 9, pp. 496–505, 2008.
  25. M. Fekkes, F. I. Pijpers, A. M. Fredriks, T. Vogels, and S. P.Verloove-Vanhorick, 'Do bullied children get ill, or do ill children get bullied? a prospective cohort study on the relationship between bullying and health-related symptoms,' Pediatrics, vol. 117, no. 5, pp. 1568–1574, 2006.
  26. M. Ptaszynski, F. Masui, Y. Kimura, R. Rzepka, and K. Araki, 'Brute force works best against bullying,' in Proceedings of IJCAI 2015 Joint Workshop on Constraints and Preferences for Configuration and Recommendation and Intelligent Techniques for Web Personalization. ACM, 2015.
  27. R. Tibshirani, 'Regression shrinkage and selection via the lasso,' Journal of the Royal Statistical Society. Series B (Methodological), pp. 267–288, 1996.
Download PDF
Back