Write a report (max 1,500 words) on the challenges the dataset presents, the solutions, and your findings, which will be assessed as follows: 1)

Write a report (max 1,500 words) on the challenges the dataset presents, the

solutions, and your findings, which will be assessed as follows:

1) Discuss the following feature extraction techniques and explain how they

work and their advantages and disadvantages

a) Term Frequency-Inverse Document Frequency (TF-IDF) [10%]

b) BERT [10%]

2) Two step Classification:

a) Related/Unrelated classification:

i) Use TF-IDF features to train a standard Machine Learning model

(e.g. SVM, Naïve Bayes, Random Forest), and discuss its

performance on the testing set to classify whether the article body is

related or unrelated to the headline. [15%]

ii) Train one Deep Learning model (e.g., LSTM, RNN, CNN). Explain

and justify the architecture of the deep learning model, the hyper-

parameters used, and the loss function. Discuss the performance on

the testing set to classify whether the article body is related or

unrelated to the headline. [15%]

iii) Analyse and compare the performance results for the two models.

[10%]

b) Agree/Disagree/Discuss classification:

i) Build a new deep learning model of your choice to classify articles

into the remaining three categories (Agree/Disagree/Discuss). The

inputs to this model should be only samples that are related to the

headline (i.e. you should train and test your model on only these

samples). [15%].

ii) Analyse the performance of your model and report the results. [10%]

3) What are the ethical implications of your proposed solutions? What are

the potential biases and future misuse cases? [10%]

4) Academic English writing, with good use of technical vocabulary, correct

grammar, appropriate document structure and referencing where relevant.

[5%]

You should submit your 1,500-word report and also the associated Jupyter

notebook used to produce your analysis and graphs.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can