当前位置:网站首页>Advantages and disadvantages of evaluation methods
Advantages and disadvantages of evaluation methods
2022-07-06 10:25:00 【How about a song without trace】
1、 Over fitting : When the learner learns the training samples well , It is possible to take the characteristics of the trained samples as the general properties of all potential samples , This will lead to the decline of Pan China capability ( Generalization ability refers to the ability of the learning model to be applied to unknown samples ).
2、 Under fitting : Low learning ability , I think the general characteristics are all characteristics .
Evaluation methods :
- Set aside method : If the training set contains the vast majority of samples , Then the trained sample may be close to the desired training model , But because of the small test set , The assessment results may not be accurate enough , The pattern of basic partitioned data sets :2:1,4:1 The front is used for training , The latter is used for testing .
- Cross validation : Equal division , Stratified sampling , Take the mean , The defect is : Large data sets are too expensive , Spend more time .
- Self help law : Loop from the overall data into the sample , Put it back again , The final initial data are 0.368 The sample of does not appear , Used for testing . The self-help method can be used to test from the samples that appear in the initial data set , Such a test is also known as out of package estimation . advantage : The self-help method is smaller in the data set , It's hard to divide training effectively \ Test sets are useful , Multiple different training sets can be generated from the initial data set , shortcoming : But it changes the distribution of data sets , This will introduce Estimated deviation .
But when the initial data volume is enough , Set aside method and cross validation method are more commonly used .
Participate in the final parameter model :
General rules of parameter adjustment : Select a range and a varying step size for each parameter , This is a compromise between computational overhead and performance .
Performance metrics : Measure the pan China capability of the model , Performance depends not only on Algorithms and data , It also determines mission requirements .
The most commonly used performance measure for regression tasks : Mean square error .
Recall rate (TP/(TP+FN))、 Precision rate (TP/(TP+FP)):TP Real examples FP False positive example TN True counter example FN False counter example .
F1 It is based on the harmonic average of recall and precision :2*TP/( Total number of samples +TP-TN)
ROC: Characteristics of test work . The horizontal axis TPR( Real examples )=TP/(TP+FN), The vertical axis FPR( False positive example ):FP/(TN+FP).
Normalization : Map values from different ranges of variation to the same fixed range , Common is [0,1], Also known as normalization .
deviation : The difference between the expected output and the real tag , Describe the fitting ability of the learning algorithm itself .
Generalization error can be decomposed into deviation 、 variance ( Have you measured the change of learning performance caused by the change of the same size training set , The impact of data perturbation is characterized )、 And noise ( The lower bound of the expected generalization error that any learning algorithm can achieve in the current task is expressed ) The sum of the .
边栏推荐
- CDC: the outbreak of Listeria monocytogenes in the United States is related to ice cream products
- 使用OVF Tool工具从Esxi 6.7中导出虚拟机
- MySQL实战优化高手12 Buffer Pool这个内存数据结构到底长个什么样子?
- MySQL combat optimization expert 04 uses the execution process of update statements in the InnoDB storage engine to talk about what binlog is?
- History of object recognition
- 西南大学:胡航-关于学习行为和学习效果分析
- C杂讲 文件 初讲
- Security design verification of API interface: ticket, signature, timestamp
- 简单解决phpjm加密问题 免费phpjm解密工具
- Typescript入门教程(B站黑马程序员)
猜你喜欢

Target detection -- yolov2 paper intensive reading

Not registered via @EnableConfigurationProperties, marked(@ConfigurationProperties的使用)

解决在window中远程连接Linux下的MySQL

The 32 year old programmer left and was admitted by pinduoduo and foreign enterprises. After drying out his annual salary, he sighed: it's hard to choose

C杂讲 双向循环链表

Security design verification of API interface: ticket, signature, timestamp

MySQL实战优化高手11 从数据的增删改开始讲起,回顾一下Buffer Pool在数据库里的地位

西南大学:胡航-关于学习行为和学习效果分析

The appearance is popular. Two JSON visualization tools are recommended for use with swagger. It's really fragrant

用于实时端到端文本识别的自适应Bezier曲线网络
随机推荐
Super detailed steps to implement Wechat public number H5 Message push
The programming ranking list came out in February. Is the result as you expected?
Vscode common instructions
MySQL36-数据库备份与恢复
Redis集群方案应该怎么做?都有哪些方案?
The appearance is popular. Two JSON visualization tools are recommended for use with swagger. It's really fragrant
Constants and pointers
MySQL实战优化高手04 借着更新语句在InnoDB存储引擎中的执行流程,聊聊binlog是什么?
在jupyter NoteBook使用Pytorch进行MNIST实现
Google login prompt error code 12501
Complete web login process through filter
MySQL combat optimization expert 07 production experience: how to conduct 360 degree dead angle pressure test on the database in the production environment?
MySQL Real Time Optimization Master 04 discute de ce qu'est binlog en mettant à jour le processus d'exécution des déclarations dans le moteur de stockage InnoDB.
A necessary soft skill for Software Test Engineers: structured thinking
C miscellaneous lecture continued
What should the redis cluster solution do? What are the plans?
Inject common SQL statement collation
Write your own CPU Chapter 10 - learning notes
In fact, the implementation of current limiting is not complicated
保姆级手把手教你用C语言写三子棋