Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)(a) State Bayes’ theorem for a k-class problem involving d independent features. Discuss the various probabilities arising in Bayes’ theorem. describe liklihood based decision rule for classification.

(b) Consider data with features x and y, randomly selected from a population  comprising classes A and B, as shown in the table. What is the probability that a new sample with x=1, y=2 belongs to class B? Make only necessary assumptions and list them.

Class      Samples      x=1      x=2      y=1      y=2
 A               6             4          2         5          1
 B               4             2          2         3          1

(c) List the various stages of classifier-design cycle, and describe the associated challenges to be addressed.

problem2)(a) What is meant by partitional clustering? Justify the following statement with an ex: Forgy’s algorithm groups a given set of N samples into K clusters.

(b) Consider the two class problem with class A and class B. A feature x is normally distributed for class A with μA =0, σA=1 and normally distributed for class B with μB=1, σB=2. What decision boundary will optimally divide the measurement x into decision regions if P(A)=P(B)? Find the decision rule based on the linear descriminant function and test the class of a random sample with x=4.

problem 3)(a) What is the need for a biometric system? describe the various issues to be addressed during the design of biometric pattern recognition / identification.

(b) describe various stages of the Hebb’s training algorithm. Design a 2-input AND function using Hebb’s rule.

problem 4)(a) With a neat diagram of generalized architecture pertaining to back propagation net (BPN), describe the four major stages of the training algorithm. List advantages and disadvantages of the algorithm.

(b) List methods for evaluating the error rate of a classifier. describe any one method with an ex.

problem 5)(a) describe briefly Statistical Pattern Recognition system.

(b) describe the Hopfield Net with a neat diagram.

(c) describe briefly, the Minimum Variance method of clustering.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94443

Have any Question? 


Related Questions in Computer Engineering

1 in your own words describe the two motivations for

1. In your own words, describe the two motivations for defining functions in your programs. 2. We have been thinking about computer programs as sequences of instructions where the computer methodically executes one instr ...

1 implement a new version of the map adt from section 32 to

1. Implement a new version of the Map ADT from Section 3.2 to use a sorted list and the binary search algorithm. 2. The implementation of the Sparse Matrix ADT from Chapter 4 can be improved by storing the MatrixElement ...

1 what is the difference between a threat agent and a

1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. How is infrastructure protection (assuring the security of utility services) related to info ...

1 what drawbacks to symmetric and asymmetric encryption are

1. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie Hellman? 2. What is steganography, and what can it be used for? 3. Which security protocols are predominantly use ...

Data structures using java mid termq1 software engineers

Data structures using JAVA mid term Q1. Software engineers typically break the software development process into the following four phases: analysis, ____, implementation, testing and debugging. a. design b. requirements ...

1 why is it important to use a structured systematic method

1. Why is it important to use a structured, systematic method for designing networks? What problems can occur if such methods are not used? 2. Compare and contrast the top-down network design method shown in Figure 1-1 w ...

1 what is risk management why is the identification of

1. What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? 2. According to Sun Tzu, what two key understandings must you achi ...

1 compare the tcp header and the udp header list the fields

1. Compare the TCP header and the UDP header. List the fields in the TCP header that are not part of the UDP header. Give the reason for each missing field. 2. In TCP, if the value of HLEN is 0111, how many bytes of opti ...

Unit homework1 write the syntax for a computer program to

Unit Homework 1. Write the syntax for a computer program to perform advanced loops. 2. Create a sub procedure and a function procedure. 3. Use a two-dimensional array to store, access, and search for elements within a co ...

Assume that you have been hired to manage a large domestic

Assume that you have been hired to manage a large domestic and foreign information system. what are some of the issues and solution that you would discuss and plan.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen