Designing Semantics Dropout Noise And Enforcing Sparsity

G.V. Chakradhar, V Swamy Naidu, M. Veerabhadra Rao

Abstract


We examine one profound learning technique named stacked denoising autoencoder (SDA). SDA stacks a few denoising autoencoders and connects the yield of each layer as the learned portrayal. Each denoising autoencoder in SDA is prepared to recoup the information from a ruined form of it. We build up another content portrayal display in view of a variation of SDA: marginalized stacked denoising autoencoders (mSDA), which receives straight rather than nonlinear projection to quicken preparing and minimizes limitless commotion dissemination keeping in mind the end goal to take in more vigorous portrayals. We use semantic data to grow mSDA and create Semantic-upgraded Marginalized Stacked Denoising Autoencoders (smSDA). The semantic data comprises of bullying words.


References


A. M. Kaplan and M. Haenlein, “Users of the world, unite! The challenges and opportunities of social media,” Business horizons, vol. 53, no. 1, pp. 59–68, 2010.

R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R. Lattanner, “Bullying in the digital age: A critical review and metaanalysis of cyberbullying research among youth.” 2014.

M. Ybarra, “Trends in technology-based sexual and non-sexual aggression over time and linkages to nontechnology aggression,” National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.

B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations in the anxiety–depression link: Test of a mediation model,” Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.

S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook of bullying in schools: An international perspective. Routledge/Taylor & Francis Group, 2010.

G. Gini and T. Pozzoli, “Association between bullying and psychosomatic problems: A meta-analysis,” Pediatrics, vol. 123, no. 3,pp. 1059–1065, 2009.

A. Kontostathis, L. Edwards, and A. Leatherman, “Text mining and cybercrime,” Text Mining: Applications and Theory. John Wiley & Sons, Ltd, Chichester, UK, 2010.

J.-M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, “Learning from bullying traces in social media,” in Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, 2012, pp. 656–666.

Q. Huang, V. K. Singh, and P. K. Atrey, “Cyber bullying detection using social and textual analysis,” in Proceedings of the 3rd International Workshop on Socially-Aware Multimedia. ACM, 2014, pp. 3–6.

D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, “Detection of harassment on web 2.0,” Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1–7, 2009.

K. Dinakar, R. Reichart, and H. Lieberman, “Modeling the detection of textual cyberbullying.” in The Social Mobile Web, 2011.

V. Nahar, X. Li, and C. Pang, “An effective approach for cyberbullying detection,” Communications in Information Science and Management Engineering, 2012.

M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, “Improved cyberbullying detection using gender information,” in Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop

(DIR2012). Ghent, Belgium: ACM, 2012.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.