Question

Information retrieval help! Will email Starbucks gift card for help. Leave your email in your answer!

Alice lost her phone a wek ago. When she finally got a new phone with a replaced SIM card, she found she got a thousand new messages, many of whichase Just spum She wanted fiber out the乎am. To her sadness, she lost the contacts as wel and could not know which messages ae from her friends. Aice went through 12 messages and moted down 4 observations for each message in Table 1) Y: whether the message is spam: I for yes, 0 for no, (2) H whether the senders number is local. I for yes. O fof no: 3) U:whether the message has an URL link: I for yes, 0 for no, 4) L: whether the message is long: I for having more than 40 characters, O otherwise Table I observations of the messages Y H UL 0.66 A. [18 points] Complcte Table 2 with probabilkies using the information present in Table 1. The conditional 1Y0.667 and the pricr probability P(Y-0)- 0.5 has been filled out for probabilty P(H B. |7 points] Alice wants to determine if a message is spam based on its characteristics: whether or not the senders number is local, the message has an URL link, or the message is long. In terms of probabilistic reasoning. we can formulate the question as evaluating the condaional probabiity PIYH.U.L). We say that the message is a spam if F(Y = 1 I H. U. L) > P(Y 0 H. U. L). Suppose we have a message from a non-kcal number 《H = 0). which has an URL link(U 1 ) andis not long (L-. We wantb determine if te message is a span. Compute P(Y = 1 I H = 0. U 1-1 0) and F(Y-0 I H 0, U 1. L 0) using the 12 examples in Table l would you conclude that the message is a spam? C. 15 points] Now, ignore Table 1, and consider all possibilities you can fi in Table 2 Are there any cons๕ants on the values that we must respect when assigning these values? In other words, cai we fill in Table 2 with 8 arbitrary real values? If not, are there any constraints on some values that we must folow?

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
Information retrieval help! Will email Starbucks gift card for help. Leave your email in your answer!...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information retrieval help! Will email Starbucks gift card for help. Leave your email in your answer!...

    Information retrieval help! Will email Starbucks gift card for help. Leave your email in your answer! Zipf's Law! Zipf's Law expresses the proportion of term-occurrences associated with a term as a function of the term's frequency-based rank. Zipf's law can be stated as follows: where P is the proportion of term occurrences associated with termt, r is the frequency-based rank associated with term t, and c is a constant (for English, e 0.1). Approximately what proportion of term occurrences would...

  • 3. -/3 points MINTROSTAT9 6.E.075. My Notes Ask Your Teacher v Computers in some vehicles calculate...

    3. -/3 points MINTROSTAT9 6.E.075. My Notes Ask Your Teacher v Computers in some vehicles calculate various quantities related to performance. One of these is the fuel efficiency, or gas mileage, usually expressed as miles per gallon (mpg). For one vehicle equipped in this way, the miles per gallon were recorded each time the gas tank was filled, and the computer was then reset. In addition to the computer's calculations of miles per gallon, the driver also recorded the miles...

  • In this exercise you will work with LU factorization of an matrix A. Theory: Any matrix A can be ...

    In this exercise you will work with LU factorization of an matrix A. Theory: Any matrix A can be reduced to an echelon form by using only row replacement and row interchanging operations. Row interchanging is almost always necessary for a computer realization because it reduces the round off errors in calculations - this strategy in computer calculation is called partial pivoting, which refers to selecting for a pivot the largest by absolute value entry in a column. The MATLAB...

  • Can someone please help me for this assignment? Cryptography — the science of secret writing —...

    Can someone please help me for this assignment? Cryptography — the science of secret writing — is an old science; the first recorded use was well before 1900 B.C. An Egyptian writer used previously unknown hieroglyphs in an inscription. We will use a simple substitution cypher called rot13 to encode and decode our secret messages. ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in...

  • In Java plz due today Assignment 4 - Email, Shwitter and Inheritance Select one option from...

    In Java plz due today Assignment 4 - Email, Shwitter and Inheritance Select one option from below. All (both) options are worth the same number of points. The more advanced option(s) are provided for students who find the basic one too easy and want more of a challenge. OPTION A (Basic): Message, EMail and Tweet Understand the Classes and Problem Every message contains some content ("The British are coming! The British are coming!"). We could enhance this by adding other...

  • I really need your help to answer this question for Tables 1 - 5. Thank you...

    I really need your help to answer this question for Tables 1 - 5. Thank you so much I appreciate it!!! For each set of values, determine whether an exponential function is a good model. If so, find the function. If not, explain why. Part C-Linear and Exponential Models (possible 15 points) You can transform an exponential function into a linear function by taking the logarithm of each side. Since linear models are easy to recognize, you can then determine...

  • In this problem, we will model the likelihood of a particular client of a financial firm defaulting on his or her loans based on previous transactions. There are only two outcomes, "Yes" or &...

    In this problem, we will model the likelihood of a particular client of a financial firm defaulting on his or her loans based on previous transactions. There are only two outcomes, "Yes" or "No", depending on whether the client eventually defaults or not. It is believed that the client's current balance is a good predictor for this outcome, so that the more money is spent without paying, the more likely it is for that person to default. For each x,...

  • I NEED HELP WITH DEBUGGING A C PROGRAM! PLEASE HEAR ME OUT AND READ THIS. I...

    I NEED HELP WITH DEBUGGING A C PROGRAM! PLEASE HEAR ME OUT AND READ THIS. I just have to explain a lot so you understand how the program should work. In C programming, write a simple program to take a text file as input and encrypt/decrypt it by reading the text bit by bit, and swap the bits if it is specified by the first line of the text file to do so (will explain below, and please let me...

  • IN JAVA PLS DUE TODAY Assignment 4 - Email, Shwitter and Inheritance Select one option from...

    IN JAVA PLS DUE TODAY Assignment 4 - Email, Shwitter and Inheritance Select one option from below. All (both) options are worth the same number of points. The more advanced option(s) are provided for students who find the basic one too easy and want more of a challenge. OPTION A (Basic): Message, EMail and Tweet Understand the Classes and Problem Every message contains some content ("The British are coming! The British are coming!"). We could enhance this by adding other...

  • File Edit Insert Format Arrange View Share Window Help Untitled 13-Edited View Zoom Insert Table Chart...

    File Edit Insert Format Arrange View Share Window Help Untitled 13-Edited View Zoom Insert Table Chart Text Shape Media Comment Write a regular expression for numeric constants in C. These are octal, decimal, or hexadecimal integers, or decimal or hexadecimal floating-point values An octal integer begins with 0, and may contain only the digits 0-7. A hexadecimal integer begins with 0x or OX, and may contain the digits 0-9 and a/A-1/F. A decimal floating-point value has a fractional portion (beginning...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT