UC Irvine Classifieds>UC Irvine Online Courses>Text Analytics 2: Visualizing Natural Language Processing

Text Analytics 2: Visualizing Natural Language Processing

About this Course

__ _ Visualizing Natural Language Processing _ is the second course in the Text Analytics with Python professional certificate (or you can study it as a stand-alone course). Natural language processing (NLP) is only useful when its results are meaningful to humans. This second course continues by looking at how to make sense of our results using real-world visualizations. How can we understand the incredible amount of knowledge that has been stored as text data? This course is a practical and scientific introduction to text analytics. That means you’ll learn how it works and why it works at the same time. On the practical side, you’ll learn how to visualize and interpret the output of text analytics. You’ll learn how to create visualizations ranging from word clouds, heatmaps, and line plots to distribution plots, choropleth maps, and facet grids. You’ll work through real case-studies using jupyter notebooks and to visualize the results of machine learning in Python using packages like pandas, matplotlib, and seaborn. On the scientific side, you’ll learn what it means to understand language computationally. How do word embeddings and topic models relate to human cognition? Artificial intelligence and humans don’t view language in the same way. You’ll see how both deep learning and human beings interact with the meaning that is encoded in language.

Created by: University of Canterbury

Level: Introductory


Related Online Courses

Are you a developer who wants to understand how their software can get released internationally, without their source code having to be altered? Or are you a PM responsible for launching a website... more
Big data systems such as Hadoop and Spark emerge as enabling technologies in managing massive amounts of data across hundreds or even thousands of computing nodes. Meanwhile, cloud computing... more
To the surprise of absolutely no one, trust is broken on the Internet. Wherever you go online, the advice is the same--make sure you understand what's behind each button before you click it. In... more
The project provides you with a real-life challenge that requires you to flex and firm your cloud native application development muscle. You will start with a problem situation. To address this... more
On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL