Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)(a) State Bayes’ theorem for a k-class problem involving d independent features. Discuss the various probabilities arising in Bayes’ theorem. describe liklihood based decision rule for classification.

(b) Consider data with features x and y, randomly selected from a population  comprising classes A and B, as shown in the table. What is the probability that a new sample with x=1, y=2 belongs to class B? Make only necessary assumptions and list them.

Class      Samples      x=1      x=2      y=1      y=2
 A               6             4          2         5          1
 B               4             2          2         3          1

(c) List the various stages of classifier-design cycle, and describe the associated challenges to be addressed.

problem2)(a) What is meant by partitional clustering? Justify the following statement with an ex: Forgy’s algorithm groups a given set of N samples into K clusters.

(b) Consider the two class problem with class A and class B. A feature x is normally distributed for class A with μA =0, σA=1 and normally distributed for class B with μB=1, σB=2. What decision boundary will optimally divide the measurement x into decision regions if P(A)=P(B)? Find the decision rule based on the linear descriminant function and test the class of a random sample with x=4.

problem 3)(a) What is the need for a biometric system? describe the various issues to be addressed during the design of biometric pattern recognition / identification.

(b) describe various stages of the Hebb’s training algorithm. Design a 2-input AND function using Hebb’s rule.

problem 4)(a) With a neat diagram of generalized architecture pertaining to back propagation net (BPN), describe the four major stages of the training algorithm. List advantages and disadvantages of the algorithm.

(b) List methods for evaluating the error rate of a classifier. describe any one method with an ex.

problem 5)(a) describe briefly Statistical Pattern Recognition system.

(b) describe the Hopfield Net with a neat diagram.

(c) describe briefly, the Minimum Variance method of clustering.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94443

Have any Question? 


Related Questions in Computer Engineering

1 compare the medium of a wired lan with that of a wireless

1. Compare the medium of a wired LAN with that of a wireless LAN in today's communication environment. 2. Explain why the MAC protocol is more important in wireless LANs than in wired LANs. 3. Explain why there is more a ...

1 using the cidr notation show the ipv6 address compatible

1. Using the CIDR notation, show the IPv6 address compatible to the IPv4 address 129.6.12.34. 2. Using the CIDR notation, show the IPv6 address mapped to the IPv4 address 129.6.12.34. 3. Using the CIDR notation, show the ...

1 what is the difference between half-duplex and

1. What is the difference between half-duplex and full-duplex transmission modes? 2. Name the four basic network topologies, and cite an advantage of each type. 3. For n devices in a network, what is the number of cable ...

In tcp assume a client has 100 bytes to send the client

In TCP, assume a client has 100 bytes to send. The client creates 10 bytes at a time in each 10 ms and delivers them to the transport layer. The server acknowledges each segment immediately or if a timer times out at 50 ...

Write a c program that fills random squares of 3 by 3 with

Write a C++ program that fills random squares of 3 by 3, with unique numbers from 1 to 9, and tests if the generated matrix forms a Magic Squares. Your program should loop until  three magic squares  are generated and  p ...

Question 1 for each part show the sales orders that sold

Question 1: For each part, show the Sales Orders that sold that part. Show the Parts that have no sales as well. Display the PartID, Part Name, Sales Order #, the Quantity sold and the price for the order. Hint: A Left J ...

The level of security in terms of the corresponding bit

The level of security in terms of the corresponding bit length directly influences the performance of the respective algorithm. We now analyze the influence of increasing the security level on the runtime. Assume that a ...

Create a simple model that includes some agents a rule for

Create a simple model that includes some agents, a rule for birth of agents (see hatch primitive) and a rule for death of agents (see die primitive). It is often useful to include a rule for agent movement. The agents ca ...

Purposedemonstrate the ability to implement and use

Purpose Demonstrate the ability to implement and use structured data types utilizing the facilities of the C programming language. Assignment Write a program that simulates a soft drink machine. Your program will consist ...

Suppose a virtual machine monitor call it vmm-1 is running

Suppose a virtual machine monitor (call it VMM-1) is running another virtual machine monitor (VMM-2), which in turn is running a version of the Linux operating system. The user running the Linux system is editing a file. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro