wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Supervised and unsupervised learning

profile
Padma Magar
Mar 14, 2022
0 Likes
0 Discussions
95 Reads

Supervised learning:

          Supervised learning is the types of machine learning in which machines are trained using well "labelled" training data, and on basis of that data, machines predict the output. The labelled data means some input data is already tagged with the correct output.In supervised learning, the training data provided to the machines work as the supervisor that teaches the machines to predict the output correctly. It applies the same concept as a student learns in the supervision of the teacher.In supervised learning, models are trained using labelled dataset, where the model learns about each type of data. Once the training process is completed, the model is tested on the basis of test data (a subset of the training set), and then it predicts the output.

Types of supervised learning:

1.Regression

2.Classification

Unsupervised learning:

       As the name suggests, unsupervised learning is a machine learning technique in which models are not supervised using training dataset. Instead, models itself find the hidden patterns and insights from the given data. It can be compared to learning which takes place in the human brain while learning new things. It can be defined as unsupervised learning is a type of machine learning  in which models are trained using unlabeled dataset and are allowed to act on that data without any supervision.

Types of Unsupervised learning:

1.Clustering

2.Association

       


Comments ()


Sign in

Read Next

CSI and Organizational Change

Blog banner

PODIO

Blog banner

Social engineering in cyber security

Blog banner

Cyber Security Standards

Blog banner

Virtual memory

Blog banner

NETSUITE

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Buffering

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Concurrency and Deadlocks

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Memory management

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Way to make your meal healthier.

Blog banner

Disk Management

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Memory hierarchy

Blog banner

Types of Malware in Cyber Security

Blog banner

Compromising Mobile Platforms

Blog banner

Photorec - media recovery tool

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Advantage of freedom

Blog banner

Outlook.com

Blog banner

Big Data Architecture

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Memory management

Blog banner

Vulnerability Assessment

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

R Programming

Blog banner

GUIDE TO GIS

Blog banner

The Right way of cooking

Blog banner

5 Stages of Digital Marketing

Blog banner

PPT methodology

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Virtual Memory

Blog banner

Blockchain Transactions

Blog banner

Article on Zoho Corporation

Blog banner

Types of Hackers

Blog banner

File Management

Blog banner

Deming’s Process

Blog banner

KASHMIR TRIPS

Blog banner