Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)(a) State Bayes’ theorem for a k-class problem involving d independent features. Discuss the various probabilities arising in Bayes’ theorem. describe liklihood based decision rule for classification.

(b) Consider data with features x and y, randomly selected from a population  comprising classes A and B, as shown in the table. What is the probability that a new sample with x=1, y=2 belongs to class B? Make only necessary assumptions and list them.

Class      Samples      x=1      x=2      y=1      y=2
 A               6             4          2         5          1
 B               4             2          2         3          1

(c) List the various stages of classifier-design cycle, and describe the associated challenges to be addressed.

problem2)(a) What is meant by partitional clustering? Justify the following statement with an ex: Forgy’s algorithm groups a given set of N samples into K clusters.

(b) Consider the two class problem with class A and class B. A feature x is normally distributed for class A with μA =0, σA=1 and normally distributed for class B with μB=1, σB=2. What decision boundary will optimally divide the measurement x into decision regions if P(A)=P(B)? Find the decision rule based on the linear descriminant function and test the class of a random sample with x=4.

problem 3)(a) What is the need for a biometric system? describe the various issues to be addressed during the design of biometric pattern recognition / identification.

(b) describe various stages of the Hebb’s training algorithm. Design a 2-input AND function using Hebb’s rule.

problem 4)(a) With a neat diagram of generalized architecture pertaining to back propagation net (BPN), describe the four major stages of the training algorithm. List advantages and disadvantages of the algorithm.

(b) List methods for evaluating the error rate of a classifier. describe any one method with an ex.

problem 5)(a) describe briefly Statistical Pattern Recognition system.

(b) describe the Hopfield Net with a neat diagram.

(c) describe briefly, the Minimum Variance method of clustering.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94443

Have any Question? 

Related Questions in Computer Engineering

Your final project will be to create a program for the 3pi

Your final project will be to create a program for the 3Pi to perform a number of line following tasks. You may not program the robot between tasks but are allowed to provide inputs to the robot before each task. All lin ...

1 compare the medium of a wired lan with that of a wireless

1. Compare the medium of a wired LAN with that of a wireless LAN in today's communication environment. 2. Explain why the MAC protocol is more important in wireless LANs than in wired LANs. 3. Explain why there is more a ...

Io accesses oft en have a large impact on overall system

I/O accesses oft en have a large impact on overall system performance. Calculate the CPI of a machine using the performance characteristics above, assuming a non-virtualized system. Calculate the CPI again, this time usi ...

1 we said that tcp provides a connection-oriented service

1. We said that TCP provides a connection-oriented service between the two application programs. A connection in this case needs a connection identifier that distinguishes one connection from another. What do you think t ...

1 design and implement a simulation of some other racquet

1. Design and implement a simulation of some other racquet sport (e.g., tennis or table tennis). 2. Craps is a dice game played at many casinos. A player rolls a pair of normal six-sided dice. If the initial roll is 2, 3 ...

1 using the implementation of the ipaddresses class

1. Using the implementation of the IPAddresses class developed in this chapter, write a method that displays the IP addresses stored in the class in ascending order. Use the method in a program. 2. Write a program that s ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

Oop for computer science assignment specificationa small

OOP for Computer Science Assignment Specification A small village infant school wishes to computerise its pupil records and you are to write a menu-driven application for this in C++. The data relating to pupils will be ...

Spanning trees given a node it in a amprested graph s for

Spanning trees: Given a node It in a &rested graph S. for which there is at least one path from every node in S ton, state a precise definition for a spanning tree of 9 rooted at n. Then think of what might be meant by a ...

1 given is a stream cipher which uses a single lfsr as key

1. Given is a stream cipher which uses a single LFSR as key stream generator. The LFSR has a degree of 256. 1. How many plaintext/ciphertext bit pairs are needed to launch a successful attack? 2. Describe all steps of th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro